DocumentCode :
633020
Title :
Knowledge based authentication requirements
Author :
Skracic, Kristian ; Pale, Predrag ; Jeren, Branko
Author_Institution :
Fac. of Electr. Eng. & Comput., Univ. of Zagreb, Zagreb, Croatia
fYear :
2013
fDate :
20-24 May 2013
Firstpage :
1116
Lastpage :
1120
Abstract :
Published evaluation criteria for knowledge based authentication (KBA) methods do not provide a sufficiently formed framework to use as a guideline during design and testing of KBA methods and tools. The aim of this paper is to define a set of requirements for creating a secure user authentication method based on the user´s knowledge. The requirements address four issues in user authentication. The first refers to eavesdropping an authentication session and using the intercepted information in the next session. By repeating the recorded response an attacker should not be able to authenticate himself as a legitimate user. The second issue is the ability to predict an authentication challenge by analyzing previous challenges. If an attacker can record a set of challenges over a long period, he should not be able to learn the next challenge beforehand. The third issue is the guessability of correct responses to authentication challenges. In general, multiple sources of information about the user are available to an attacker. The correct response to a challenge should not be obvious from such sources. The fourth issue is the authentication server´s vulnerability. By this any information system component that is used to authenticate users is meant. If an attacker manages to gain partial or complete access to the authentication server and its data, the user´s digital identity should not be compromised. These for requirements are proposed as a generic checklist against which KBA methods and tools should be checked.
Keywords :
knowledge based systems; message authentication; KBA methods; KBA tools; authentication server vulnerability; eavesdropping; generic checklist; information system component; intercepted information; knowledge based authentication requirements; legitimate user; secure user authentication method; user digital identity; user knowledge; Authentication; Dictionaries; Information systems; Keyboards; Knowledge based systems; Servers;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information & Communication Technology Electronics & Microelectronics (MIPRO), 2013 36th International Convention on
Conference_Location :
Opatija
Print_ISBN :
978-953-233-076-2
Type :
conf
Filename :
6596424
Link To Document :
بازگشت