|
USING THE UNIVERSAL TWO FACTOR AUTHENTICATION METHOD IN WEB APPLICATIONS BY SOFTWARE EMULATED DEVICE
|
|
|
P. Petrov;P. Dimitrov; S.Stoev; G.Dimitrov;F. Bulut
|
|
|
||
|
|
|
|
1314-2704
|
|
|
||
|
English
|
|
|
20
|
|
|
2.1
|
|
|
|
|
|
||
|
The use of a qualified electronic signature has become more widespread in recent years,
and one of the main prerequisites for this is the development of electronic services using a qualified electronic signature for authentication. Some of the services require additional entry of a username and password and they show that a qualified electronic signature complements the security of authentication by becoming the so-called "Second factor". All services provided by a qualified electronic signature in the browser are in fact web applications which used java applets or additional plug-ins. All of these are normally inconvenient for the end users. Electronic signatures, like the Universal Two Factor authentication method (U2F), implement the principle of asymmetric encryption when signing documents. In theory, a U2F device can be used for similar purposes if, instead of a random string of characters, the hash value of a file is encrypted. Although this cannot be done in practice, the Universal Two Factor authentication method is currently being developed and it is possible that in a future version the signing of documents is quite possible as a procedure. Technologies such as the Universal Two Factor authentication method meet the requirements of the modern user and could offer, in addition to the previously established USB interface, support for Near-Field Communication (NFC) - a protocol for wireless communication, often used for contactless payments or even data exchange. Only few of the manufacturers of U2F devices have built NFC support, and unfortunately, NFC support is limited to some modern mobile devices, so some manufacturers are turning to another wireless technology - Bluetooth. However, this is considered by many developers as a step backwards because Bluetooth technology requires device pairing, which adds another step to the authentication process. Another potential problem would be the range of the Bluetooth protocol, which often exceeds 50 meters - unacceptable for a U2F device, the main essence of which is to be extremely close to its owner. Unlike USB and NFC connectivity, Bluetooth technology also requires power. |
|
|
conference
|
|
|
||
|
||
|
20th International Multidisciplinary Scientific GeoConference SGEM 2020
|
|
|
20th International Multidisciplinary Scientific GeoConference SGEM 2020, 18 - 24 August, 2020
|
|
|
Proceedings Paper
|
|
|
STEF92 Technology
|
|
|
International Multidisciplinary Scientific GeoConference-SGEM
|
|
|
SWS Scholarly Society; Acad Sci Czech Republ; Latvian Acad Sci; Polish Acad Sci; Russian Acad Sci; Serbian Acad Sci & Arts; Natl Acad Sci Ukraine; Natl Acad Sci Armenia; Sci Council Japan; European Acad Sci, Arts & Letters; Acad Fine Arts Zagreb Croatia; C
|
|
|
403-410
|
|
|
18 - 24 August, 2020
|
|
|
website
|
|
|
cdrom
|
|
|
7013
|
|
|
electronic signature; universal two factor; U2F; authentication; web
applications |
|