A Modular Framework for Multi-Factor Authentication and Key Exchange

被引:0
|
作者
Fleischhacker, Nils [1 ]
Manulis, Mark [2 ]
Azodi, Amir [3 ]
机构
[1] Univ Saarland, D-66123 Saarbrucken, Germany
[2] Univ Surrey, Surrey Ctr Cyber Secur, Guildford GU2 5XH, Surrey, England
[3] Hasso Plattner Inst, Potsdam, Germany
关键词
two-factor; multi-factor authentication; tag-based authentication; key exchange; framework; modular design; SECURE; BIOMETRICS; PROTOCOLS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Multi-Factor Authentication (MFA), often coupled with Key Exchange (KE), offers very strong protection for secure communication and has been recommended by many major governmental and industrial bodies for use in highly sensitive applications. Over the past few years many companies started to offer various MFA services to their users and this trend is ongoing. The MFAKE protocol framework presented in this paper offers a la carte design of multi-factor authentication and key exchange protocols by mixing multiple types and quantities of authentication factors in a secure way: MFAKE protocols designed using our framework can combine any subset of multiple low-entropy (one-time) passwords/PINs, high-entropy private/public keys, and biometric factors. This combination is obtained in a modular way from efficient single-factor password-based, public key-based, and biometric-based authentication-only protocols that can be executed in concurrent sessions and bound to a single session of an unauthenticated key exchange protocol to guarantee forward secrecy. The modular approach used in the framework is particularly attractive for MFAKE solutions that require backward compatibility with existing single-factor authentication solutions or where new factors should be introduced gradually over some period of time. The framework is proven secure using the state-of-the art game-based security definitions where specifics of authentication factors such as dictionary attacks on passwords and imperfectness of the biometric matching processes are taken into account.
引用
收藏
页码:190 / 214
页数:25
相关论文
共 50 条
  • [31] Outsider Key Compromise Impersonation Attack on a Multi-factor Authenticated Key Exchange Protocol
    Ma, Zhiqiang
    He, Jun
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 320 - 337
  • [32] Database Multi-factor Authentication via Pluggable Authentication Modules
    Hamilton, Cameron
    Olmstead, Aspen
    [J]. 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 367 - 368
  • [33] Internet Banking Login with Multi-Factor Authentication
    Boonkrong, Sirapat
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (01): : 511 - 535
  • [34] Multi-factor authentication for shibboleth identity providers
    de Mello, Emerson Ribeiro
    Wangham, Michelle Silva
    Loli, Samuel Bristot
    da Silva, Carlos Eduardo
    da Silva, Gabriela Cavalcanti
    de Chaves, Shirlei Aparecida
    Loli, Bruno Bristot
    [J]. JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2020, 11 (01)
  • [35] Multi-Factor Authentication Using Threshold Cryptography
    Venukumar, Vishnu
    Pathari, Vinod
    [J]. 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 1694 - 1698
  • [36] Privacy preserving multi-factor authentication with biometrics
    Bhargav-Spantzel, Abhilasha
    Squicciarini, Anna
    Modi, Shimon
    Young, Matthew
    Bertino, Elisa
    Elliott, Stephen
    [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (05) : 529 - 560
  • [37] A Method of Risk Assessment for Multi-Factor Authentication
    Kim, Jae-Jung
    Hong, Seng-Phil
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2011, 7 (01): : 187 - 198
  • [38] Multi-Factor Authentication with OpenId in Virtualized Environments
    Alves, J. M.
    Rodrigues, T. G.
    Beserra, D. W.
    Fonseca, J. C.
    Endo, P. T.
    Kelner, J.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2017, 15 (03) : 528 - 533
  • [39] Robust Multi-Factor Authentication for Fragile Communications
    Huang, Xinyi
    Xiang, Yang
    Bertino, Elisa
    Zhou, Jianying
    Xu, Li
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (06) : 568 - 581
  • [40] Secure Internet Financial Transactions: A Framework Integrating Multi-Factor Authentication and Machine Learning
    Aburbeian, Alsharif Hasan Mohamad
    Fernandez-Veiga, Manuel
    [J]. AI, 2024, 5 (01) : 177 - 194