Considered classification of two-factor authentication methods, the main advantages and disadvantages of the methods. Proposed two-factor authentication scheme on the basis of SMS-messages using McEliece and Niederreiter modified crypto-code scheme, methodology for risk assessment of the use of two-factor authentication methods considered practical algorithms for constructing asymmetrical crypto-code systems.
two-factor authentication, McEliece and Niederreiter modified crypto-code scheme
"Usovershenstvovanye metoda dvukhfaktornoi autentyfykatsyy na osnove yspolzovanyia modyfytsyrovannыkh krypto-kodovыkh skhem" [Improving the method of two-factor authentication based on the use of modified crypto-code schemes],
Information Processing Systems,