The Security of Lazy Users in Out-of-Band Authentication
ACM Transactions on Privacy and Security, pp. 1-32, 2020.
End-to-end encryptioncryptographic protocolskey exchangemessaging
Faced with the threats posed by man-in-the-middle attacks, messaging platforms rely on “out-of-band” authentication, assuming that users have access to an external channel for authenticating one short value. For example, assuming that users recognizing each other’s voice can authenticate a short value, Telegram and WhatApp ask their users...More
Full Text (Upload PDF)
PPT (Upload PPT)