For each paper, your assignment is two-fold. Before lecture:
lecn.txt
, and
sqn.txt
. You cannot use the question below. To the
extent possible, during lecture we will try to answer these questions. If
you submit your question before midnight the day before lecture, then there
is a chance we will answer by email. Below, we have included the questions
we've received from students in past years (when available), along with
answers to those questions, in case you find it helpful.
Once you submit your own question and answer (or after the deadline has passed), you can view the questions and answers that other students submitted.
Lecture 3
Two-factor Authentication (2FA) is commonly used to authenticate users. For example, MIT allows as a second factor a code sent via an SMS message to the user's cell phone. The FIDO standard describes a 2FA scheme using a USB dongle. Which scheme is more secure? Which scheme is more user friendly?