Security Analysis of SMS as a Second Factor of Authentication: The challenges of multifactor authentication based on SMS, including cellular security deficiencies, SS7 exploits, and SIM swapping.
Roger Piqueras JoverPublished in: ACM Queue (2020)
Keyphrases
- security analysis
- security requirements
- authentication protocol
- user authentication
- symmetric key
- high security
- mutual authentication
- smart card
- security properties
- security model
- elliptic curve cryptography
- public key
- ban logic
- encryption scheme
- internet banking
- private key
- authentication scheme
- security problems
- key exchange
- security mechanisms
- image encryption
- encryption algorithm
- biometric authentication
- security policies
- information systems
- mobile commerce
- information security
- cloud computing
- access control