The Community for Technology Leaders
RSS Icon
Issue No.05 - September/October (2011 vol.9)
pp: 81-85
Mobile two-factor authentication systems can provide three security guarantees. First, a compromised PIN won't provide a way to authenticate an attacker or provide any extra information about the corresponding phone. Second, a stolen phone won't provide a way to authenticate the attacker and can't leak the corresponding PIN. Finally, a compromised verifier will have absolutely no information about the PIN and therefore can't leak it. The personal nature of mobile devices and the ability to provide these three guarantees without long passwords make two-factor authentication a better match for the mobile world.
mobile computing, computer security, two-factor authentication, mobile authentication, mobile phones, passwords, PINs, online PINs, offline PINs
Dimitri DeFigueiredo, "The Case for Mobile Two-Factor Authentication", IEEE Security & Privacy, vol.9, no. 5, pp. 81-85, September/October 2011, doi:10.1109/MSP.2011.144
1. A. Felt and D. Wagner, "Phishing on Mobile Devices," presentation at W2SP: Web 2.0 Security and Privacy Workshop, 2011; .
2. "Authenticating REST Requests," Amazon Web Services; RESTAuthentication.html.
3. D. Goodin, "Get Your German Interior Minister's Fingerprint Here," The Register,30 Mar. 2008; .
4. P. MacKenzie and M.K. Reiter, "Networked Cryptographic Devices Resilient to Capture," Proc. 2001 IEEE Symp. Security and Privacy, IEEE CS Press, 2001, pp. 12–25.
4 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool