The Security of Lazy Users in Out-of-Band Authentication
IACR Cryptology ePrint Archive, Volume 2018, 2018.
Faced with the threats posed by man-in-the-middle attacks, messaging platforms rely on “out-of-band” authentication, assuming that users have access to an external channel for authenticating one short value. For example, assuming that users recognizing each other’s voice can authenticate a short value, Telegram and WhatApp ask their users...More
Full Text (Upload PDF)
PPT (Upload PPT)