SURVEY ON ONE TIME PASSWORD

Size: px
Start display at page:

Download "SURVEY ON ONE TIME PASSWORD"

Transcription

1 SURVEY ON ONE TIME PASSWORD Nilesh Khankari, Geetanjali Kale Department of Computer Engineering, Pune Institute of Computer Technology, Pune, India ABSTRACT: Authentication is process in which right user will be given access to resource. Authentication protects resource to access from unauthorised user. There various traditional techniques are available for authentication. But these techniques have disadvantages. To overcome this disadvantages multi-factor authentication is used for authentication. In multi-factor authentication more than one authentication method is combined to perform authentication. One form of authentication that is mostly used with other forms of authentication for multifactor authentication is one time password (OTP). One time password is valid for one login session. In this paper we conduct survey of existing one time password generation methods. Keywords: Authentication, One time password (OTP), Security, Multi-factor authentication [1] INTRODUCTION In today s world to access critical resources authentication is required. To secure our critical resources more secure authentication is necessary. Authentication is process in which authorized user (i.e user which has rights to access particular resource) will be given access to resource. During authentication only authorize user will get access to resources. For example user who needs to perform internet banking operations is required to provide authentication details to access his internet banking account. There are various types of methods available for authentication. These methods basically classify into following 3 types. 1. Knowledge based authentication 2. Token based authentication 3. Biometric authentication In knowledge based authentication password is used for authentication. There are two types of password for authentication, Alphanumeric password and Graphical password. Alphanumeric password is sequence of alphabets, numbers and special characters. So in alphanumeric password characters are used to create password. This password should not guessable. But alphanumeric password which is not guessable is hard to remember. For example most people combines there name with some number related to them. Such passwords can be easily guessed. If we set passwords with random characters like UluR5g9SNX is strong password but it is hard to remember. To solve this problem pictures Nilesh Khankari and Geetanjali Kale 1

2 SURVEY ON ONE TIME PASSWORD are used for password such passwords are called as graphical passwords. Graphical passwords are easy to remember. But shoulder surfing attack is possible in graphical password [1]. In token based authentication user has token which is used for authentication. For example Credit card, ATM card. Disadvantage of this method is when token is lost or stolen. In biometric authentication user is authenticated using user s physical and behavioural properties which are unique for each user. Face recognition, Fingerprint, voice recognition etc. are example of biometric authentication. Biometric authentication is costly as it requires hardware device for recognition of physical property of user [2]. Each above method has some disadvantage to overcome this disadvantages combination of more than one technique of authentication is used to authenticate user. This phenomenon called as multi-factor authentication. Multi-factor authentication uses the combination of more than one type of authentication. More than one form of authentication used in multi-factor authentication that s why multi-factor authentication. Multi-factor authentication provides extra layer of authentication which minimises risk in risk based authentication. Example of multi-factor authentication is ATM authentication in which ATM cards are used together with a PIN number. Authentication which uses two authentication techniques is called Two-factor authentication. One form that can be used for multi-factor authentication along with the traditional username-password scheme is the concept of One Time Passwords. In this paper, we conduct a comprehensive survey of the existing OTP generation techniques. [2] ONE TIME PASSWORD (OTP) Since 1981 when Lamport introduced one time password schemes, many banks authentication systems are now using his theory to provide secure authentication. One-Time Password is one of the simplest and most popular forms of two-factor authentication today. A One-Time Password (OTP) is valid for only one login session. Unlike a static password, a one time password changes each time the user logs in. A one time password generation system uses a different password every time you want to authenticate yourself. The most important shortcoming that is addressed by OTPs is that, they are not vulnerable to replay attacks. One-time passwords are a form of strong authentication, provides much better protection to on-line bank accounts, corporate networks and other systems containing sensitive data. OTP generation algorithms typically make use of randomness. This is necessary otherwise it would be easy to predict future OTPs from observing previous ones. [Figure-1] shows simple and basic OTP authentication system. One time passwords are generated either from a static mathematical expression or by the actual time of day and changes periodically which is called counter one-time-password or time synchronized one-time-password. There are basically 2 approaches for the generation of OTP s: 1. Based on the timesynchronized token and 2. Based on mathematical algorithm. 2

3 Figure: 1. Basic OTP Authentication flow [3] OTPS BASED ON TIME-SYNCHRONIZED TOKEN A Based on time-synchronization between the authentication server and the client providing the password (OTPs are valid only for a short period of time). A time-synchronized OTP is uses a piece of hardware called a security token. An accurate clock is their inside the token which is synchronized with the clock on authentication server. On these OTP systems, time is an important part of the OTP algorithm since the generation of new OTPs is based on the current time rather than, or in addition to, the previous password or a secret. This token may be a proprietary device, or a mobile phone or similar mobile device which runs software that is proprietary, freeware, or open-source. Due to the cost of hardware token and the infrastructure requirements this method is inconvenient. Fadi Aloul et.al proposed a system which uses a mobile phone as a software token for One Time Password generation. OTP generated by this system uses factors that are unique to both, the user and the mobile device itself. OTP generated is valid for only a short user defined period of time [4]. K.C. Liao et.al presented a QR code technique to support the onetime password system. As the QR code applications with mobile phones can derive the benefits inherited from QR code. Various properties, such as mobility and handiness, benefit from the mobile device make this approach more practical. This approach eliminates the usage of the password verification table. This scheme is a cost effective solution as most internet users already have mobile phones [6]. Manav Singhal and Shashikala Tapaswi proposed Two Factor Authentication mechanism using Mobile handsets. This two factor Nilesh Khankari and Geetanjali Kale 3

4 SURVEY ON ONE TIME PASSWORD authentication is based on Time Synchronous Authentication. Manav Singhal and Shashikala Tapaswi used RFC1321 MD5 Message Digest Algorithm of Epoch Time, Personal Identity Number (PIN) and Init - Secret to generate One Time Password (OTP) which would be valid for 60 seconds [8]. Huang Y et.al described Time-Synchronized OTP (TSOTP), a simple and effective OTP method that generates a unique password for one-time use. This system calculates TSOTP based on both time stamps and sequence numbers [16]. [4] OTPS BASED ON MATHEMATICAL ALGORITHM A mathematical algorithm is used to generate a new unique password. In this approach OTPs are generated using two methods one is based on the previous password and other is based on a challenge. OTPs generated based on previous password method effectively a chain and must be used in a predefined order. Each new OTP may be created from the past OTPs used. OTPs generated based on a challenge i.e. a random number chosen by the authentication server or transaction details or a counter is used. Song Luo et.al proposed a new one-time password scheme based on the bilinear pairings using smart card. Using the bilinear pairings, this scheme generates temporary identity and one-time password from user s identity to provide anonymity in authentication process proposed scheme is secure against forgery attack and ID attack under the random oracle model [3]. One time password based on noisy password technique is proposed by K. Alghathbar and H. Mahmoud. The noisy password is constituted of several parts, the actual password and additional noisy parts that are well studied to generate different passwords almost every time a user wants to authenticate him. This system alleviated the problem of shoulder surfing or eves dropping by making the replay of a password is of no use [5]. Sainath Guptaa et.al presented a unique graphical authentication system. System proposed by Sainath Guptaa et.al generates pseudo random one time passwords using a set of inkblots, which are unique to each user. This presented system is a simple, highly scalable and strong authentication system. According to authors presented system is simple enough for users to use and strong enough to keep malicious users away. Limitation of this proposed system is login duration is long [7]. Xuguang Ren and Xin-Wen Wu proposed an effective dynamic user authentication scheme. This scheme generates dynamic OTP based on user s password, the authenticating time, as well as a unique property that the user possesses at the moment of authentication. This scheme considers the time factor from previous work and combines one of the space factors like MAC address, providing a more secure and low overhead authentication manner This system effectively protects user s account against various attacks such as phishing attack, reply attack, and perfect-man-in-the-middle attack. Software phishing attack can be possible in this scheme [9]. 4

5 Longyan Gong, et.al proposed a novel one-time password (OTP) mutual authentication scheme based on challenge/response mechanisms. This scheme shares random sub-passwords and corresponding hashes between a user and a server and performs modular algebraic operations on two or more randomly chosen sub-passwords. Using this phenomenon relatively independent OTPs are produced in this scheme. The used sub-passwords are renewed according to random permutation functions [10]. Wen-Bin Hsieh and Jenq-Shiou Leu proposed a method with a volatile time/location-based password features more secure and more convenient for user authentication. In this paper, Wen-Bin Hsieh and Jenq-Shiou Leu proposed a solution that makes use of a time and location dependent OTP which prevents permanent passwords from being sniffed for authentication while accessing the web application services in a mobile environment. The proposed solution improves the user convenience and authentication security greatly. This scheme transparently authenticates users in a tolerant geometric region as well so that users do not need to manually type in their passwords [11]. Huiyi L. and Yuegong Z proposed scheme which uses two one-way hash functions, one is a hash chain-which is the core of the authentication scheme, and the other is used to secure the hash chain for information transmission between the user and server. This scheme provides functions of bidirectional identity authentication and presents higher security and lower computational cost [12]. Hayashi E., et.al present a framework is presented that combines passive factors (e.g. location) and active factors (e.g. tokens) in a probabilistic model for selecting an authentication scheme that satisfies security requirements; however, it does not consider client device constraints [13]. X Jiang, J Ling proposed new OTP authentication scheme is simple and effective. The proposed scheme uses the SM2 cryptographic algorithm and Hash function for generation of OTP. This scheme ensures data transmission security, provides the mutual authentication between client and server resists different kinds of attacks, and protects the user s identity information effectively. This scheme has simple structure, requires less computation time and reduces burden on the server [14].Byung Rae Cha et.al presented a new Mobile-OTP model with a password key generation method to create one-time passwords which makes use of fingerprints and cyclic permutation for Mobile-OTP systems [15]. Jeonil Kang, et.al suggested a two-factor face authentication scheme based on matrix transformations and a user password [16]. Yair H., et.al proposed context-aware multi-factor authentication scheme based on a Dynamic PIN. This scheme produces a graphical challenge based on context, client device constraints, and risk associated, while balancing assurance and usability. A methodology is proposed in this paper where the crypto-function used to generate the Dynamic PIN. A PIN is produced without any predictable backward and forward Nilesh Khankari and Geetanjali Kale 5

6 SURVEY ON ONE TIME PASSWORD correlation which makes infeasible for an attacker to predict the next PIN. The proposed approach integrates authentication factors based on user s client devices e.g. SIM cards, biometric readers, etc., sensors, and APIs, to modulate security assurance, and to optimise it using context [17]. [5] CONCLUSION The past decade has seen a growing interest in using one time password for strong authentication. In this paper, we have performed survey of one time password generation systems. This study shows that there is a need to implement a mechanism to generate One Time Passwords which has more randomness and which expires before the attacker can recover it. Much more research and user studies are needed for one time password (OTP) generation techniques. This study will provide an improvement to existing one time password authentication mechanisms. REFERENCES [1] X. Suo, Y. Zhu, and G. S. Owen, "Graphical passwords: A survey," Computer Security Applications Conference, 21st Annual. IEEE, pp , [2] Wayman, J., Jain, A. K., Maltoni, D., and Maio, D., Biometric systems: Technology, design and performance evaluation, New York: Springer, [3] Song Luo, Jianbin Hu, Zhong Chen, An identity based one time password scheme with anonymous authentication, IEEE NSWCTC, vol. 2, pp , April [4] Fadi Aloul, Syed Zahidi, and Wassim El-Hajj. "Two factor authentication using mobile phones." Computer Systems and Applications, AICCSA IEEE/ACS International Conference on. IEEE, [5] K. Alghathbar and H. Mahmoud, "Noisy password scheme: A new one time password system." Electrical and Computer Engineering, CCECE'09. Canadian Conference on. IEEE, [6] K.C. Liao, W.H. Lee, M.H. Sung and T.C. Lin, A One-Time Password Scheme with QR- Code Based on Mobile Phone, In Proceedings of the 5th International Joint Conference on INC, IMS and IDC,, pp , [7] Sainath Gupta, Pruthvi Sabbu, Siddhartha Varma and Suryakanth V.Gangashetty. Passblot: A Highly Scalable Graphical One Time Password System, International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March [8] Manav Singhal, and Shashikala Tapaswi. "Software tokens based two factor authentication scheme." International Journal of Information and Electronics Engineering, Vol. 2, No. 3, 383-6, [9] Xuguang Ren, Xin-Wen Wu, A Novel Dynamic User Authentication Scheme, International Symposium on Communications and Information Technologies, pp ,

7 [10] L. Gong, J. Pan, B. Liu, S. Zhao, A novel one-time password mutual authentication scheme on sharing renewed finite random sub-passwords, Journal of Computer and System Sciences, Vol. 79 Issue 1, Pages , February, [11] Wen-Bin Hsieh and Jenq-Shiou Leu. "A Time and Location Information Assisted OTP Scheme." Wireless personal communications 72.1, pp , [12] Huiyi L., Yuegong Z., An Improved One-time Password Authentication Scheme, Proceedings of ICCT, pp 1-5, [13] Hayashi E., Das S., Amini S., Hong J., Oakley, CASA: context-aware scalable authentication, Proceedings of the Ninth Symposium on Usable Privacy and Security, pp ACM, Newcastle [14] X Jiang, J Ling, Simple and Effective One-time Password Authentication Scheme, Instrumentation and Measurement, Sensor Network and Automation (IMSNA), pp , [15] Byung Rae Cha, Yong Il Kim, and Jong Won Kim. "Design of new P2P-enabled Mobile- OTP system using fingerprint features." Telecommunication Systems 52.4, pp , [16] Huang Y, Huang Z, Zhao HR, Lai XJ. A new one-time password method, International Conference on Electronic Engineering and Computer Science, pp.32 37, [17] Kang, J., Nyang, D., Lee, K., Two-factor face authentication using matrix permutation transformation and a user password, Information Science. 269, pp. 1 20, [18] Yair H. Diaz-Tellez, Eliane L. Bodanese, Theo Dimitrakos, Michael Turner, "Context- Aware Multifactor Authentication Based on Dynamic Pin", IFIP Advances in Information and Communication Technology, Volume 428, pp ,2014. Nilesh Khankari and Geetanjali Kale 7

One Time Password Generation for Multifactor Authentication using Graphical Password

One Time Password Generation for Multifactor Authentication using Graphical Password One Time Password Generation for Multifactor Authentication using Graphical Password Nilesh B. Khankari 1, Prof. G.V. Kale 2 1,2 Department of Computer Engineering, Pune Institute of Computer Technology,

More information

Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725

Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Rahul Kale Neha Gore Kavita Nilesh Jadhav Mr. Swapnil Shinde Bachelor s Degree program in Information Technology Engineering

More information

Security Levels for Web Authentication using Mobile Phones

Security Levels for Web Authentication using Mobile Phones Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se

More information

Internet Banking Two-Factor Authentication using Smartphones

Internet Banking Two-Factor Authentication using Smartphones Internet Banking Two-Factor Authentication using Smartphones Costin Andrei SOARE IT&C Security Master Department of Economic Informatics and Cybernetics Bucharest University of Economic Studies, Romania

More information

A SECURE COMMUNICATION IN SMART PHONES USING TWO FACTOR AUTHENTICATIONS

A SECURE COMMUNICATION IN SMART PHONES USING TWO FACTOR AUTHENTICATIONS A SECURE COMMUNICATION IN SMART PHONES USING TWO FACTOR AUTHENTICATIONS Soumya Murali 1, Anitha.B 2, Anitha Mary Paul 3 1, 2, 3 Assistant Professor, 1, 2 Sree Buddha College of Engineering, Pattoor, Alappuzha,

More information

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics

More information

International Journal of Software and Web Sciences (IJSWS) www.iasir.net

International Journal of Software and Web Sciences (IJSWS) www.iasir.net International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

An Approach towards Security in Private Cloud Using OTP

An Approach towards Security in Private Cloud Using OTP An Approach towards Security in Private Cloud Using OTP Vishal Paranjape 1, Vimmi Pandey 2 1 PG Student, MTECH (CSE), Gyan Ganga College of Technology, Jabalpur, Madhya Pradesh, India 2 Head of Department

More information

Protected Cash Withdrawal in Atm Using Mobile Phone

Protected Cash Withdrawal in Atm Using Mobile Phone www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar

More information

Security Levels for Web Authentication Using Mobile Phones

Security Levels for Web Authentication Using Mobile Phones Security Levels for Web Authentication Using Mobile Phones Anna Vapen and Nahid Shahmehri Department of Computer and Information Science, Linköping University, SE-58183 Linköping, Sweden {anna.vapen,nahid.shahmehri}@liu.se

More information

T. Venkat Narayana Rao et al IJCSET October 2011 Vol 1, Issue 9, 569-574

T. Venkat Narayana Rao et al IJCSET October 2011 Vol 1, Issue 9, 569-574 Authentication Using Mobile Phone as a Security Token Professor T.Venkat Narayana Rao, Vedavathi K Department of Computer Science and Engineering Hyderabad Institute of Technology and Management [HITAM]

More information

Research Article. Research of network payment system based on multi-factor authentication

Research Article. Research of network payment system based on multi-factor authentication Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor

More information

2CAuth: A New Two Factor Authentication Scheme Using QR-Code

2CAuth: A New Two Factor Authentication Scheme Using QR-Code 2CAuth: A New Two Factor Authentication Scheme Using QR-Code N. Harini 1 and Dr. T.R Padmanabhan 2 Department of Computer Science and Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India. n_harini@cb.amrita.edu,

More information

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication

More information

Integration of Sound Signature in 3D Password Authentication System

Integration of Sound Signature in 3D Password Authentication System Integration of Sound Signature in 3D Password Authentication System Mr.Jaywant N. Khedkar 1, Ms.Pragati P. Katalkar 2, Ms.Shalini V. Pathak 3, Mrs.Rohini V.Agawane 4 1, 2, 3 Student, Dept. of Computer

More information

Two Factor Authentication Using Smartphone Generated One Time Password

Two Factor Authentication Using Smartphone Generated One Time Password IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 2 (May. - Jun. 2013), PP 85-90 Two Factor Authentication Using Smartphone Generated One Time Password

More information

IDRBT Working Paper No. 11 Authentication factors for Internet banking

IDRBT Working Paper No. 11 Authentication factors for Internet banking IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

SECUDROID - A Secured Authentication in Android Phones Using 3D Password

SECUDROID - A Secured Authentication in Android Phones Using 3D Password SECUDROID - A Secured Authentication in Android Phones Using 3D Password Ms. Chandra Prabha K M.E. Ph.D. 1, Mohamed Nowfel 2 E S, Jr., Gowtham V 3, Dhinakaran V 4 1, 2, 3, 4 Department of CSE, K.S.Rangasamy

More information

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin

More information

INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY. Implementation of Multi-Factor Authentication Scheme

INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY. Implementation of Multi-Factor Authentication Scheme IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY Implementation of Multi-Factor Authentication Scheme Vasundhara Bhele Prof. Nilesh Chaubey Prof. Shyam Dubey Computer Science &

More information

Multi Factor Authentication API

Multi Factor Authentication API GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

Advanced Authentication

Advanced Authentication White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is

More information

Entrust IdentityGuard

Entrust IdentityGuard +1-888-437-9783 sales@identisys.com IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's

More information

SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT

SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur

More information

Economic and Social Council

Economic and Social Council UNITED NATIONS E Economic and Social Council Distr. GENERAL ECE/TRANS/WP.30/AC.2/2008/2 21 November 2007 Original: ENGLISH ECONOMIC COMMISSION FOR EUROPE Administrative Committee for the TIR Convention,

More information

Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device

Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department

More information

Improving Online Security with Strong, Personalized User Authentication

Improving Online Security with Strong, Personalized User Authentication Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware

More information

Introduction to Computer Security

Introduction to Computer Security Introduction to Computer Security Identification and Authentication Pavel Laskov Wilhelm Schickard Institute for Computer Science Resource access: a big picture 1. Identification Which object O requests

More information

Enhancing Totp Protocol By Embedding Current Gps Location

Enhancing Totp Protocol By Embedding Current Gps Location Enhancing Totp Protocol By Embedding Current Gps Location U. A. Abdurrahman, M. Kaiiali and J. Muhammad Abstract Static password authentication is no longer considered secure in the internet and banking

More information

Security and Privacy Risks of Using E-mail Address as an Identity

Security and Privacy Risks of Using E-mail Address as an Identity Security and Privacy Risks of Using E-mail Address as an Identity Lei Jin, Hassan Takabi, James B.D. Joshi School of Information Sciences University of Pittsburgh Pittsburgh, PA, US lej17@pitt.edu, {hatakabi,

More information

A secure email login system using virtual password

A secure email login system using virtual password A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {bhavintanti@gmail.com} 2 SVNIT, Surat,Gujarat,India 2 {doshinikki2004@gmail.com}

More information

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

An Enhanced Countermeasure Technique for Deceptive Phishing Attack An Enhanced Countermeasure Technique for Deceptive Phishing Attack K. Selvan 1, Dr. M. Vanitha 2 Research Scholar and Assistant Professor, Department of Computer Science, JJ College of Arts and Science

More information

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication

More information

CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME

CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME Mohammed Aijaz Ahmed 1, D. Rajya Lakshmi 2 and Sayed Abdul Sattar 3 1 Department of Computer Science and

More information

Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,

More information

An Analysis of Twitter s App Based Two- Factor Authentication and Recovery System

An Analysis of Twitter s App Based Two- Factor Authentication and Recovery System An Analysis of Twitter s App Based Two- Factor Authentication and Recovery System By Alexander Tong December 2014 Abstract This paper attempts to analyze the potential of app based two- factor authentication

More information

Android Based Total Security for System Authentication

Android Based Total Security for System Authentication RESEARCH ARTICLE OPEN ACCESS Android Based Total Security for System Authentication Mithil Vasani*, Bhavesh Pandya**, Charmi Chaniyara*** *(Information Technology, Mumbai University, Sfit) ** (Assistant

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on

More information

Authentication using Mixed-mode approach.

Authentication using Mixed-mode approach. International Journal of Computer Sciences and Engineering Open Access Technical Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Authentication using Mixed-mode approach. Prasad N. Urankar 1* and Prasanna J.

More information

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication Ken Scudder Senior Director Business Development & Strategic Alliances XYPRO Technology Talbot A. Harty CEO DeviceAuthority XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

More information

Chapter 15 User Authentication

Chapter 15 User Authentication Chapter 15 User Authentication 2015. 04. 06 Jae Woong Joo SeoulTech (woong07@seoultech.ac.kr) Table of Contents 15.1 Remote User-Authentication Principles 15.2 Remote User-Authentication Using Symmetric

More information

Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics

Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics Younsung Choi College of Information and Communication Engineering, Sungkyunkwan University,

More information

French Justice Portal. Authentication methods and technologies. Page n 1

French Justice Portal. Authentication methods and technologies. Page n 1 French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication

More information

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC Ferozepur, Punjab, India Email: 1 soniaarora141@gmail.com, 2 pawanluthra81@gmail.com

More information

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication Describe the different types of authentication credentials List and explain the

More information

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com info@plurilock.com 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric

More information

RFID Based Real Time Password Authentication System for ATM

RFID Based Real Time Password Authentication System for ATM IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 RFID Based Real Time Password Authentication System for ATM Soniya B. Milmile 1 Prof.

More information

Guide to Evaluating Multi-Factor Authentication Solutions

Guide to Evaluating Multi-Factor Authentication Solutions Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor

More information

A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key

A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key International Journal of Network Security, Vol.18, No.6, PP.1060-1070, Nov. 2016 1060 A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key Trung Thanh Ngo and Tae-Young

More information

An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography

An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY Volume 16, Number 4, 2013, 324 335 An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography

More information

A Security Survey of Strong Authentication Technologies

A Security Survey of Strong Authentication Technologies A Security Survey of Strong Authentication Technologies WHITEPAPER Contents Introduction... 1 Authentication Methods... 2 Classes of Attacks on Authentication Mechanisms... 5 Security Analysis of Authentication

More information

Remote Access Securing Your Employees Out of the Office

Remote Access Securing Your Employees Out of the Office Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction

More information

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student

More information

WHITE PAPER Usher Mobile Identity Platform

WHITE PAPER Usher Mobile Identity Platform WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com info@usher.com Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction

More information

3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India

3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India 3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,

More information

CRYPTOGRAPHY AS A SERVICE

CRYPTOGRAPHY AS A SERVICE CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,

More information

Securing e-government Web Portal Access Using Enhanced Two Factor Authentication

Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Ahmed Arara 1, El-Bahlul Emhemed Fgee 2, and Hamdi Ahmed Jaber 3 Abstract This paper suggests an advanced two-factor authentication

More information

A Generalized Protocol for Mobile Authentication in Healthcare Systems

A Generalized Protocol for Mobile Authentication in Healthcare Systems A Generalized Protocol for Mobile Authentication in Healthcare Systems Eric Reinsmidt The University of Tennessee eric@reinsmidt.com Li Yang The University of Tennessee at Chattanooga li-yang@utc.edu Abstract

More information

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics

More information

A Road Map on Security Deliverables for Mobile Cloud Application

A Road Map on Security Deliverables for Mobile Cloud Application A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,

More information

Implementing two-factor authentication: Google s experiences. Cem Paya (cemp@google.com) Information Security Team Google Inc.

Implementing two-factor authentication: Google s experiences. Cem Paya (cemp@google.com) Information Security Team Google Inc. Implementing two-factor authentication: Google s experiences Cem Paya (cemp@google.com) Information Security Team Google Inc. Google services and personalization Identity management at Google 1. Internal

More information

Guidance on Multi-factor Authentication

Guidance on Multi-factor Authentication Guidance on Multi-factor Authentication June 2006 Guidance on Multi-factor Authentication Guidance on Multi-factor Authentication State Services Commission June 2006 Version 1.0 ISBN 0-478-24466-5 Crown

More information

Multi-Factor Authentication

Multi-Factor Authentication Enhancing network security through the authentication process Multi-Factor Authentication Passwords, Smart Cards, and Biometrics INTRODUCTION Corporations today are investing more time and resources on

More information

Two-Factor Authentication: Tailor-Made for SMS

Two-Factor Authentication: Tailor-Made for SMS SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication: Tailor-Made for SMS Exploring Myths, Misconceptions, and Best Practices for SMS-Based 2FA Table of Contents 4 Understanding Two-Factor

More information

Preventing Abuse of Cookies Stolen by XSS

Preventing Abuse of Cookies Stolen by XSS Preventing Abuse of Cookies Stolen by XSS Hiroya Takahashi Kenji Yasunaga Masahiro Mambo Kwangjo Kim KAIST Korea Heung Youl Youm Soonchunhyang University Korea Abstract Cross Site Scripting (XSS) makes

More information

A Feasible and Cost Effective Two-Factor Authentication for Online Transactions

A Feasible and Cost Effective Two-Factor Authentication for Online Transactions A Feasible and Cost Effective Two-Factor Authentication for Online Transactions Jing-Chiou Liou Deaprtment of Computer Science Kean University 1000 Morris Ave. Union, NJ 07083, USA jliou@kean.edu Sujith

More information

Enhancing Web Application Security

Enhancing Web Application Security Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor

More information

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Authentication Types. Password-based Authentication. Off-Line Password Guessing Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:

More information

Authentication Tokens

Authentication Tokens State Capitol P.O. Box 2062 Albany, NY 12220-0062 www.its.ny.gov New York State Information Technology Standard IT Standard: Authentication Tokens No: NYS-S14-006 Updated: 05/15/2015 Issued By: NYS ITS

More information

User Authentication Platform using Provisioning in Cloud Computing Environment

User Authentication Platform using Provisioning in Cloud Computing Environment User Authentication Platform using Provisioning in Cloud Computing Environment Hyosik Ahn, Hyokyung Chang, Changbok Jang, Euiin Choi Dept. Of Computer Engineering, Hannam University, Daejeon, Korea {hsahn,

More information

A NOVEL GRAPHICAL PASSWORD APPROACH FOR ACCESSING CLOUD & DATA VERIFICATION

A NOVEL GRAPHICAL PASSWORD APPROACH FOR ACCESSING CLOUD & DATA VERIFICATION A NOVEL GRAPHICAL PASSWORD APPROACH FOR ACCESSING CLOUD & DATA VERIFICATION Rupal Rawat 1, Sreeja Nair 2 1 M.Tech (CSE), Oriental college of science & Technology, Bhopal, Affiliated to RGPV, Bhopal, M.P,

More information

Single Password, Multiple Accounts

Single Password, Multiple Accounts Single Password, Multiple Accounts Mohamed G. Gouda Alex X. Liu 1 Lok M. Leung 2 Mohamed A. Alam 2 Department of Computer Sciences, The University of Texas at Austin, Austin, Texas 78712-0233, U.S.A. {gouda,

More information

Contributions to Web Authentication for Untrusted Computers

Contributions to Web Authentication for Untrusted Computers Linköping Studies in Science and Technology Thesis No. 1481 Contributions to Web Authentication for Untrusted Computers by Anna Vapen Submitted to Linköping Institute of Technology at Linköping University

More information

Universal Multi-Factor Authentication Using Graphical Passwords

Universal Multi-Factor Authentication Using Graphical Passwords Universal Multi-Factor Authentication Using Graphical Passwords Alireza Pirayesh Sabzevar, Angelos Stavrou Computer Science Department, George Mason University, Fairfax, Virginia, 22030 {apirayes, astavrou}@gmu.edu

More information

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,

More information

2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec

2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec 2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec TECHNOLOGY WHITEPAPER DSWISS LTD INIT INSTITUTE OF APPLIED INFORMATION TECHNOLOGY JUNE 2010 V1.0 1 Motivation With the increasing

More information

A STRONG IDENTITY IN THE ONLINE FINANCIAL WORLD OF TOMORROW

A STRONG IDENTITY IN THE ONLINE FINANCIAL WORLD OF TOMORROW A STRONG IDENTITY IN THE ONLINE FINANCIAL WORLD OF TOMORROW July 2012 WHITEPAPER BY MARK BAAIJENS, MANAGING CONSULTANT FOR THE PAYMENT COMPETENCE CENTER Author Mark finished his Master of Science degree

More information

Multi-factor authentication

Multi-factor authentication CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL

More information

Enhanced User Authentication Techniques using the Fourth Factor Some Body the User Knows

Enhanced User Authentication Techniques using the Fourth Factor Some Body the User Knows Proc. of Int. Conf. on Advances in Computer Science, AETACS Enhanced User Authentication Techniques using the Fourth Factor Some Body the User Knows K. Sharmila 1, V. Janaki 2, A. Nagaraju 3 1. Department

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application

More information

BANKING AUTHEMTICATION SYSTEM USING MOBILE-OTP WITH QR-CODE

BANKING AUTHEMTICATION SYSTEM USING MOBILE-OTP WITH QR-CODE BANKING AUTHEMTICATION SYSTEM USING MOBILE-OTP WITH QR-CODE Abhishek B. Iyer G.H.Raisoni College of Engineering and Management, Wagholi, Pune, Maharashtra, India- 412 207 Rohit A. Shah G.H.Raisoni College

More information

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Secrecy Maintaining Public Inspecting For Secure Cloud Storage Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan

More information

A Study on User Access Control Method using Multi-Factor Authentication for EDMS

A Study on User Access Control Method using Multi-Factor Authentication for EDMS , pp.327-334 http://dx.doi.org/10.14257/ijsia.2013.7.6.33 A Study on User Access Control Method using Multi-Factor Authentication for EDMS Keunwang Lee 1* 1 Dept.of Multimedia Science, Chungwoon University

More information

Strong Authentication for Secure VPN Access

Strong Authentication for Secure VPN Access Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations

More information

A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications

A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications G.Prakash #1, M.Kannan *2 # Research Scholar, Information and Communication Engineering, Anna University

More information

An Innovative Two Factor Authentication Method: The QRLogin System

An Innovative Two Factor Authentication Method: The QRLogin System An Innovative Two Factor Authentication Method: The QRLogin System Soonduck Yoo*, Seung-jung Shin and Dae-hyun Ryu Dept. of IT, University of Hansei, 604-5 Dangjung-dong Gunpo city, Gyeonggi do, Korea,

More information

Convenience and security

Convenience and security Convenience and security ControlSphere is a computer security and automation solution designed to protect user data and automate most of authentication tasks for the user at work and home environments.

More information

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Biometric Authentication Platform for a Safe, Secure, and Convenient Society 472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.

More information

Entrust. Entrust IdentityGuard 8.1. Deployment Guide. Document issue: 2.0. Date of Issue: April 2007

Entrust. Entrust IdentityGuard 8.1. Deployment Guide. Document issue: 2.0. Date of Issue: April 2007 Entrust Entrust IdentityGuard 8.1 Deployment Guide Document issue: 2.0 Date of Issue: April 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a trademark or a registered trademark of Entrust,

More information

ViSolve Open Source Solutions

ViSolve Open Source Solutions ViSolve Open Source Solutions Best-In-Class Authentication and Authorization Solutions & Services ViSolve Inc. ViSolve Securing Digital Assets Contents Security Overview Security Concerns Security Needs

More information

Ensuring Privacy of Biometric Factors in Multi-Factor Authentication Systems

Ensuring Privacy of Biometric Factors in Multi-Factor Authentication Systems Ensuring Privacy of Biometric Factors in Multi-Factor Authentication Systems Kikelomo Maria Apampa, Tian Zhang, Gary B Wills, David Argles School of Electronics and Computer Science, University of Southampton,

More information

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015. Android Based E-Voting. Harshad Velapure, Saurabh Rai, Saransh Sharma, Preetam Naiknavre, Pranali Jadhav, Kalyan Bamane Department of Information Technology, D. Y. Patil College of Engineering, Akurdi,

More information

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

Web Application Attacks and Countermeasures: Case Studies from Financial Systems Web Application Attacks and Countermeasures: Case Studies from Financial Systems Dr. Michael Liu, CISSP, Senior Application Security Consultant, HSBC Inc Overview Information Security Briefing Web Applications

More information

Authentication Levels. White Paper April 23, 2014

Authentication Levels. White Paper April 23, 2014 Summary White Paper April 23, 2014 This document describes levels of authentication that can be utilized for users known and unknown to gain access to applications and solutions. Summary... 1 Description...

More information