Path: Top -> Journal -> Telkomnika -> 2019 -> Vol 17, No 2, April 2019

2FYSH: two-factor authentication you should have for password replacement

Journal from gdlhub / 2019-05-15 14:20:00
Oleh : Sunderi Pranata, Hargyo Tri Nugroho, Telkomnika
Dibuat : 2019-05-15, dengan 1 file

Keyword : NFC, password replacement, secure authentication, two-factor authentication, usable security
Url : http://journal.uad.ac.id/index.php/TELKOMNIKA/article/view/9187
Sumber pengambilan dokumen : WEB

Password has been the most used authentication system these days. However, strong passwords are hard to remember and unique to every account. Unfortunately, even with the strongest passwords, password authentication system can still be breached by some kind of attacks. 2FYSH is two tokens-based authentication protocol designed to replace the password authentication entirely. The two tokens are a mobile phone and an NFC card. By utilizing mobile phones as one of the tokens, 2FYSH is offering third layer of security for users that lock their phone with some kind of security. 2FYSH is secure since it uses public and private key along with challenge-response protocol. 2FYSH protects the user from usual password attacks such as man-in-the-middle attack, phishing, eavesdropping, brute forcing, shoulder surfing, key logging, and verifier leaking. The secure design of 2FYSH has made 90% of the usability test participants to prefer 2FYSH for securing their sensitive information. This fact makes 2FYSH best applied to secure sensitive data needs such as bank accounts and corporate secrets.

Beri Komentar ?#(0) | Bookmark

PropertiNilai Properti
ID Publishergdlhub
OrganisasiTelkomnika
Nama KontakHerti Yani, S.Kom
AlamatJln. Jenderal Sudirman
KotaJambi
DaerahJambi
NegaraIndonesia
Telepon0741-35095
Fax0741-35093
E-mail Administratorelibrarystikom@gmail.com
E-mail CKOelibrarystikom@gmail.com

Print ...

Kontributor...

  • , Editor: sustriani

Download...