Two-Factor Authentication Model

Descripción del Articulo

The main objective of this paper is the development of a model that allows the authentication of a user for access control using the Two-Factor Authentication model. For the development of such a model we present a secure two-factor authentication (TFA) scheme based on the user's possession of...

Descripción completa

Detalles Bibliográficos
Autores: Reyes Riveros, Anderson Jhanyx, Salinas Meza, Jhon Erick, Mendoza de los Santos, Alberto Carlos
Formato: artículo
Fecha de Publicación:2023
Institución:Universidad La Salle
Repositorio:Revistas - Universidad La Salle
Lenguaje:español
OAI Identifier:oai:ojs.revistas.ulasalle.edu.pe:article/81
Enlace del recurso:https://revistas.ulasalle.edu.pe/innosoft/article/view/81
https://doi.org/10.48168/innosoft.s11.a81
https://purl.org/42411/s11/a81
https://n2t.net/ark:/42411/s11/a81
Nivel de acceso:acceso abierto
Materia:Access Control
Two-factor Authentication
Cryptography
Control de acceso
Autenticación de dos factores
Criptografía
Descripción
Sumario:The main objective of this paper is the development of a model that allows the authentication of a user for access control using the Two-Factor Authentication model. For the development of such a model we present a secure two-factor authentication (TFA) scheme based on the user's possession of a password and a cryptographically capable device. The security of this model is end-to-end in the sense that whoever wants to access in a fraudulent way is going to find it difficult and thus guarantee the security of the user of the system, the algorithm used was Cryptographic Networks, which is a double authentication model. Also the programming language cakephp 4.0 was used, in addition to using the visual studio code program to perform the algorithms required for the double authentication model to work.
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).