Document Type
Conference Paper
Rights
Available under a Creative Commons Attribution Non-Commercial Share Alike 4.0 International Licence
Disciplines
1.2 COMPUTER AND INFORMATION SCIENCE, Information Science
Abstract
The most common mechanism for online authenti- cation is the username-password. Majority of e- commerce applications are designed to provide pass- word authentication via an HTML form, with the assumption that the user needs to determine if it is safe to enter the password. In order to avoid phish- ing attacks, the user is expected to distinguish be- tween a phishing and a genuine website by checking the browser security indicators. Alternative authentication models suggest using images for authentication, introducing variations of Password Authenticated Key Exchange (PAKE) pro- tocols into TLS, using digital objects as passwords. Some authentication models suggest sending one- time password (OTP) tokens out-of-band to the user. Most computer users have too many passwords and keep forgetting them. Common issue for all authen- tication models is how to restore a legitimate user access to their account without authentication, i.e. password reset. In this paper, we investigate current password based authentication models and review their impact on phishing. We investigate two categories of issues 1) deployment obstacles for the 'stronger' authenti- cation models, and 2) security issues created by the number of passwords user needs to memorize.
DOI
https://doi.org/10.21427/6zz1-a807
Recommended Citation
Hatunic-Webster, E., Mtenzi, F. & O'Shea, B. (2011). Password-Based Authentication and Phishing. eCrime Researchers Sync-Up, University College Dublin's Centre for Cybercrime Investigation, March 15th and 16th. doi:10.21427/6zz1-a807
Publication Details
eCrime Researchers Sync-Up, organised in conjunction with University College Dublin's Centre for Cybercrime Investigation, on March 15th and 16th, 2011.