Dec. 22, 2023, 2:10 a.m. | Marwa Mouallem, Ittay Eyal

cs.CR updates on arXiv.org arxiv.org

A myriad of authentication mechanisms embody a continuous evolution from
verbal passwords in ancient times to contemporary multi-factor authentication.
Nevertheless, digital asset heists and numerous identity theft cases illustrate
the urgent need to revisit the fundamentals of user authentication. We abstract
away credential details and formalize the general, common case of asynchronous
authentication, with unbounded message propagation time. Our model, which might
be of independent interest, allows for eventual message delivery, while
bounding execution time to maintain cryptographic guarantees. Given …

asset asynchronous authentication case cases continuous credential digital factor fundamentals general identity identity theft message multi-factor multi-factor authentication passwords theft urgent

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States