On authentication factors: "What you can" and "how you do it"

Jérôme Dossogne, Frédéric Lafitte

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper, we discuss "alternatives" or derivations to the three well known authentication factors: "what you know" (pass-words⋯), "what you own" (id-cards⋯), "what you are" (biometrics⋯). We discuss and propose the factors "what you can do" and "how you do it" (mind biometric with behavioral approach). Inspired by statistical learning models, we propose a formal model for these two alternatives and describe a challenge response protocol based on these two factors. We illustrate the potential of the protocol with games unused for such purpose until now and discuss the advantages and drawbacks of our proposal compared to usual implementations of the three well known factors and also how they could complement each other.

Original languageEnglish
Title of host publicationSIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks
Pages70-78
Number of pages9
DOIs
Publication statusPublished - 2013
Event6th International Conference on Security of Information and Networks, SIN 2013 - Aksaray, Turkey
Duration: 26 Nov 201328 Nov 2013

Publication series

NameSIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks

Conference

Conference6th International Conference on Security of Information and Networks, SIN 2013
Country/TerritoryTurkey
CityAksaray
Period26/11/1328/11/13

Keywords

  • Authentication
  • Coercion
  • Cognitive
  • Factors
  • Over-the-shoulder
  • Rubber-hose cryptanalysis

Fingerprint

Dive into the research topics of 'On authentication factors: "What you can" and "how you do it"'. Together they form a unique fingerprint.

Cite this