The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.05 - September/October (2011 vol.9)
pp: 81-85
ABSTRACT
Mobile two-factor authentication systems can provide three security guarantees. First, a compromised PIN won't provide a way to authenticate an attacker or provide any extra information about the corresponding phone. Second, a stolen phone won't provide a way to authenticate the attacker and can't leak the corresponding PIN. Finally, a compromised verifier will have absolutely no information about the PIN and therefore can't leak it. The personal nature of mobile devices and the ability to provide these three guarantees without long passwords make two-factor authentication a better match for the mobile world.
INDEX TERMS
mobile computing, computer security, two-factor authentication, mobile authentication, mobile phones, passwords, PINs, online PINs, offline PINs
CITATION
Dimitri DeFigueiredo, "The Case for Mobile Two-Factor Authentication", IEEE Security & Privacy, vol.9, no. 5, pp. 81-85, September/October 2011, doi:10.1109/MSP.2011.144
REFERENCES
1. A. Felt and D. Wagner, "Phishing on Mobile Devices," presentation at W2SP: Web 2.0 Security and Privacy Workshop, 2011; http://w2spconf.com/2011/papersfelt-mobilephishing.pdf .
2. "Authenticating REST Requests," Amazon Web Services; http://s3.amazonaws.com/doc/s3-developer-guide RESTAuthentication.html.
3. D. Goodin, "Get Your German Interior Minister's Fingerprint Here," The Register,30 Mar. 2008; www.theregister.co.uk/2008/03/30german_interior_minister_fingerprint_appropriated .
4. P. MacKenzie and M.K. Reiter, "Networked Cryptographic Devices Resilient to Capture," Proc. 2001 IEEE Symp. Security and Privacy, IEEE CS Press, 2001, pp. 12–25.
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool