Enhanced User Authentication Techniques using the Fourth Factor Some Body the User Knows
|
|
|
- Lillian Kelly Malone
- 9 years ago
- Views:
Transcription
1 Proc. of Int. Conf. on Advances in Computer Science, AETACS Enhanced User Authentication Techniques using the Fourth Factor Some Body the User Knows K. Sharmila 1, V. Janaki 2, A. Nagaraju 3 1. Department of CSE, Aurora s Research and Technological Institute, Warangal, India E mail: [email protected] 2, 3. Department of CSE, Central University of Rajasthan., India E mail: [email protected] 3. E mail: [email protected] Abstract The fundamental principle of identifying a person with the help of a trusted person is being used since the beginning of mankind. Due to the drastic development of the technology, a person is identified by implementing one factor, two factor or three factor authentication techniques. In today's world of increased connectivity, authentication issues are becoming progressively important. Each and every individual system has its own approach to authenticate a person or a machine. Among these, Password authentication is the simplest and most commonly used technique for authentication. Because of its simplicity, it can be attacked easily if proper precautions are not taken. This can be enhanced using two factor authentication (smart cards) and three factor authentication (biometrics). In addition to the above three factors, identity can also be proved using human relationship. In this paper, we concentrate on the most economical and social networking technique for authentication. i.e a fourth factor, somebody the user knows and whom he can trust upon. Index Terms Authentication, Biometrics, Social network, Vouching, vouch code I. INTRODUCTION Authentication is the process of checking the original identity, i.e., to verify whether a user or a machine is really whom he or it claims to be. This is usually achieved using one or more fundamental authentication factors. The different authentication techniques existing today can be divided into three groups: 1. Knowledge-based --Something the user knows or he only is aware of, i.e., some secret information e.g., Password, PIN, security question 2. Possession-based --Something the user has or possesses, i.e., some physical object (e.g., Smart-card, Badge or a token ); 3. Physiology-based or behaviour-based --Something the user personally is, i.e., some biometric data (e.g., Fingerprint, Voice, Iris pattern). Knowledge and possession-based authentication mechanisms indicate that users may be permitted to use any system or service which needs to memorize the authenticator. As the chances of keys being lost, stolen or easily duplicated, are more. Hence, it is suggested to use biometrics [6]. In certain instances, where a user is unable to use all the above said criteria to authenticate himself (when the user forgets or unable to recollect his password, loses his hardware token, cannot provide his biometrics) and Elsevier, 2013
2 is not in a position to contact Help desk [1], we suggest that there is a fourth factor which may be categorized as fourth group i.e somebody whom the user trusts and may be termed as backup authentication. 1. Someone whom the user knows, i.e., somebody whom the user trusts (e.g., Family member, Friend). Based on the human relationships, the above said factor acts as backup authenticator. In section II, existing system of authentication methodologies are explained and in section III, we explain various problems in implementing the current authentication factors. In section IV, we narrate our novel approach of Vouching and in section V, we conclude our proposal. II EXISTING SYSTEM. In this section, we discuss about the existing authentication techniques using one, two and three factor authentication. Authentication Factors: The authentication factors of an individual are generally classified into three categories: One Factor Authentication - (Information known to the user) It is a password or a personal identification number (PIN) which is to be secretly maintained. Two Factor Authentication - (Thing of Possession) ID card, software token or cell phone with a combination of a password. Three Factor Authentication - (Human Biometrics) Fingerprint, Iris, DNA, Voice recognition etc, with a combination of one and two factors. A. One Factor Authentication Authentication by password is the most commonly used mechanism but also considered as the most vulnerable form of authentication, as shown in Fig1. Significant effort has been put for developing the system of password administration with different levels of password complexity [6]. The usage of password system has two main disadvantages; the first one is that they are easily guessable. Another drawback is the necessity of frequent change of passwords. If any of the above are not met, they are easily crackable. Many users note down them in common places and put at risk, the security of password [10]. Even if the system administrators force the users to periodically change the passwords, the probability that an attacker will obtain the password, by guessing or by brute force attack is high. Yet, many companies use this system as the simplest way of protecting their data. Fig 1: Example of one factor Authentication B. Two Factor Authentication As the use of password authentication is weakened by software attacks, it is necessary to improve the security by using two factors [7]. Since two-factor authentication uses more than one factor for verification, it is considered to be more secure. Two-factor authentication expects the use of two authentication factors as shown in Fig 2, i.e a software token (PIN) and a hardware token (Smart Card / USB token). Hardware authentication tokens are used to improvise the security in user authentication. Smart-card-based password authentication provides two-factor authentication [9], where a successful login needs to have a valid smartcard and a valid password. Principle of the USB Tokens: The USB token is a small portable device. It plugs directly into a computer s USB port and therefore does not require the installation of any special hardware on the user s computer. Once the USB token is detected [13] by the system, it prompts the user to enter his or her password (the second authenticating factor) so as to gain access to the system. USB tokens are hard to be duplicated. Therefore, they act as a secure medium for storing and transmitting confidential data. The device has the ability to store digital certificates that can be used in a public key infrastructure (PKI) environment [9] also. 256
3 Fig 2: Example of two factor Authentication Principle of Smart Card:A smart card also known as integrated circuit card (ICC) is a pocket-sized card with integrated circuits embedded. It requires special device for reading the embedded data. Smart cards provide identification and authentication of a user along with his confidential data storage. Smart cards also provide strong security authentication for single sign-on (SSO) transactions within large organizations [13]. C. TOKENS: A security token can be defined as a physical device which authenticates an authorized user to perform any online transaction. It can also be referred as an authentication token or a cryptographic token [7]. Authentication Tokens are of two formats: a) Hardware Token b) Software Token. Hardware Tokens: These are small devices which can be easily carried. Some of these tokens store cryptographic keys or biometric data (Credit Cards), where as others display a PIN that changes with time randomly (physical token) [13]. At any instance of time, if a user desires to authenticate himself, he has to use the PIN displayed on the token in addition to his normal account password. Software Tokens: These are the tokens generated using Random Number Generator (RNG). This RNG generates a password which is called as a token that changes with time. Such tokens implement a One Time Password (OTP) algorithm. OTP algorithms [9] are crucial in providing security to the systems since unauthorized users should not be able to guess the next password. The sequence of random numbers should be generated randomly for a maximum period, without repetition. The benefits of tokens include: Security: This can be provided by introducing cryptography, digital certificates to store and extract information from hardware devices. Portability: Since the devices are small in size, they can be easily carried and accessible like the USB tokens. Simple plug ins (User Convenience): The USB ports can be easily used therefore convenient and comfortable. Flexible and Ease: Administrative ease is very crucial in maintenance of any security system with respect to time, accuracy, efficiency in an acceptable cost. One application of these tokens is its wide usage in laptops. In this scenario, if the user wants to login, he has to enter a password and a random number which is generated by OTP algorithm while the USB token is plugged into the laptop. If a hacker wants to access the laptop, he must compromise both the USB and the user account password to log into the laptop which may be extremely difficult. The security cannot be assured when the token is lost or the password is guessed. The Two factor authentication provides stronger security against the normal password authentication. But still, there are chances of failure if both the authentication factors are compromised by a hacker (e.g., an attacker could successfully obtain the password and the data in the smart-card). In these circumstances, a third authentication factor can solve the problem and improve the system s security. C. Three Factor Authentication Another authentication mechanism is the third factor authentication through biometrics. Here, users are identified by physiological or behavioural characteristics [6]. Three factor authentication [7] is submission of Biometrics like Finger print, Voice recognition, Iris pattern along with the other two factors as shown in Fig 3. An advantage of biometrics is that the match rate between two people and their biometric features is very 257
4 low. Examples of biometric features include hand or finger impressions, facial gestures, iris recognition etc [5]. Biometrics acts as a reliable authentication factor since they cannot be easily lost or forgotten. Biometric authentication may satisfy the security requirement process but with constraints. For example, voice authentication has considerable error rates in noise disturbance environments [14]. Face recognition schemes may be susceptible to differences in lighting surroundings. The fingerprint readers can be beaten-up by fake fingerprints. Physical authentication tokens overcome error rate and high memorable properties [15]. However, they are mostly vulnerable to theft and impersonation of legitimate users by the hackers. Fig 3: Example of three factor authentication A limitation of three factor authentication is its implementation. i.e installation of Biometric machinery and its maintenance is cumbersome. And they are not applicable for online transactions or ATM machines due to the expensive hardware needed [18]. D. Trustee based Authentication This type of authentication includes taking the help of a trusted third party for proving the identity of an individual. Authenticating users through an alternate address is an example of trustee based authentication [8]. In some organizations, the trust based authentication works when a user who fails to access the system through primary authentication is authenticated by system administrators or his/her colleagues who can request a temporary password on his/her behalf. In 2006, Brainard et al. of RSA has proposed a two-factor authentication system (PIN + token) for system access in which a user who loses his/ her token can receive help from a pre-selected trustee called as Helper [1]. In this system, the trustee authenticates the user so as to generate a temporary pass code. This code acts as a substitute for the user s lost token for a specified short period. E. Connection-less authentication system: This method is implemented using a mobile device and a computer. The mobile device generates a onetime password which acts as a token generator at defined intervals locally and the same pass code is also generated at the server side with time synchronization [1]. Then the user enters the generated code into the machine and accesses it. Table I compares the existing authentication factors, their properties with examples. In the next section, we discuss about some of the securing issues related to the existing authentication factors. TABLE I: COMPARISION OF AUTHENTICATION FACTORS [3]. Name Example Property What you know One Factor Authentication User ID, Pass-word, PIN Shared, Easy to guess, Forgotten What you have One Factor Authentication Cards, Badges Keys, Tokens Shared, Duplicated, Lost or Stolen What you know + What you have Two Factor Authentication ATM card + PIN Shared, PIN is the weakest link What you are Three Factor Authentication Finger print, Face, Iris, Voice Scan the finger print, Devices are Costly 258
5 III SECURITY ISSUES IN IMPLEMENTING THE AUTHENTICATION FACTORS. In spite of providing security trough authentication factors, it is the responsibility of every individual to maintain the secrecy of their security tokens. Government organizations are enforcing standards, passing laws and forcing organizations and agencies to follow these standards to meet the security challenges. There are many issues with regard to security in implementing any of the authentication factors. Though each of the above mentioned authentication factors are suitable and advantageous for their own purposes, they still have some flaws which do not provide solution to all the requirements of the users. Many systems today rely on static passwords to verify the user s identity. On the other hand, these passwords give rise to major security constraints [11]-[12]. users normally incline to use easily guessable passwords, use the same password for their multiple accounts, store them on their personal computers etc. moreover, hackers possess many advanced techniques to steal passwords such as shoulder surfing, snooping, sniffing, guessing, [17] etc. Passwords are identified to be one of the easiest targets of hackers. Therefore, many organizations are trying to find out more secure methods to protect their applications, customers and employees. This lead to the usage of two factor authentication which requires the usage of a smart card/ token. All the financial organizations are using tokens as a means of two factor authentication. but if the user cannot provide both the factors in combination, the authentication seems to be impossible. And in biometrics, it may be difficult for the machinery to identify the person accurately because people change over time. So, these systems are not reliable always. In the next section we present the importance of fourth factor authentication i.e vouching and a model of its working environment. IV. OBJECTIVE: VOUCHING. In a three factor authentication system, a user is authenticated on submission of all of his authenticated information i.e Password, smartcard and his biometrics [6]. He cannot be recognized as an authentic user if he fails to submit either of the above said factors. The main objective of Vouching is to permit the user to continue his transaction in case he cannot authenticate himself using all his credentials. Whenever the authorized user is unable to do his/her transactions either because of password mismatch, failure of debit/credit card or impossession of biometrics, he has to make use of this Vouching [1]. What happens when a user loses, or does not possess his token? In this case, the user's inability to authenticate himself may be overcome through a call to a help desk. The help desk operator must vouch for the user and provide him with a temporary pass code. This solution is generally workable in practice. Nevertheless, help desk backup authentication can be expensive and even less convenient where the help desk service is not available 24 hours a day. This may become a serious concern for social engineering [2]. For example, the help desk operator, not knowing the user personally, may take a chance in exploiting the user s privacy. In the Next section, we narrate our proposal in detail. A. Current Proposal: Because of failure of one or all the authentication factors, the user cannot make any transaction and his work will be in a suspended mode. At this juncture, our aim is to design an emergency authentication mechanism for the users (Askers) who are unable to authenticate themselves to the machine. These Askers could authenticate themselves to the system with the help of already preregistered users (Helpers), also termed as back up authentication. B. Pre-requisites: In our system, the pre-requisites are: The Helper should be a pre-registered user of the organization. At the time of registration with the organization, it is mandatory that the Asker should introduce a Helper who is a pre-registered user of the same organization, whom the Asker feels trustworthy. Both the Asker and the Helper should share Public and Private key pairs with the organization. In a public key system, there are two keys involved in which only one key has to be maintained as secret and the other one can be made public. The key in a shared secret system is referred to as shared-secret key and the key that is made public is called public key. The key that is kept secret is termed as Private key. C. Prototype of the proposal: In our proposal, all the user s information like names, account numbers, mobile numbers and address etc are recorded at the time of creating an account at the organisation. The trustees are also informed with the 259
6 necessary information stating that they are acting as trustees for a specified Asker. These trustees will be referred to as Helpers in the rest of the paper. Fig. 4 illustrates the step wise procedure of our proposal. When a user (Asker) is in emergency where he/she is unable to make a transaction due to the loss of his authentication factors, the Asker may contact the Helper either through a mobile call or in person too (Step1). Asker must obtain a temporary code from the organisation with the help of a Helper. The process gets initiated only when the Asker sends a message to the Helper, and in turn the Helper acknowledges the Asker s request. Then the Helper forwards the request to the Organisation. There by there is no chance for non-repudiation at all the ends since there is a notification for all the three participants. Fig 4: A pictorial representation of vouching process At Helper:When a request is received from the Asker, the Helper has to communicate with the organisation, providing his credentials to the organisation along with the message sent by the Asker. Then the Helper requests the organisation to generate a temporary code which can be passed from the Helper to the Asker to make a transaction (Step 2) [4]. The Organisation then generates a vouch code which is an encrypted form of combination of private and public keys of the two users (Asker and Helper) and forwards it to the Helper (Step 3). At Asker: This generated vouch code is then forwarded from the Helper to the Asker to prove his identity (Step 4). This forwarded code is sent to the Organisation by the Asker (Step 5). The organisation then compares the code and understands that the Asker is indeed a genuine user and allows him to make an emergency transaction by providing an OTP. The Asker uses this temporary Vouch Code and continues his transaction. This emergency code given by the organisation is an OTP which is valid for a period of 24 hours and then expires (Step 6). This procedure of generating an emergency password can become a flexible security policy and can be more cost-effective, convenient and secure to use. Vouching is predominantly useful as a means of backup authentication. For practical implementation of fourth factor authentication, a secure authentication system must be developed so that neither the Asker nor the Helper can deceive without the notice of the other. Authentication is applied on a group of users with apt rights. i.e a Helper uses his authentication devices for providing emergency authentication provision to Asker. The connection establishment between the Asker, Helper and the Organisation is similar to the RSA [16] secured systems as shown in Fig 5. RSA Authentication Manager Implements two ways of generating emergency codes [5], [6] a temporary code and a set of one time pass codes. Temporary codes exist for a specified period of time whereas in set of pass codes, each of them can be used only one time. Here, user identification and verification plays a vital role. Ensuring that Asker is a genuine person is highly needed since there are several methods of obtaining unauthorized access. 260
7 Fig 5: Structure of RSA SecureID system D. Security Concerns for the proposal: In the earlier days of cryptography, keys were never transmitted over the network since a compromised key may cause more damage than one compromised message [3]. But, nowadays cryptographic systems are developed and implemented strongly so as to overcome that risk. Furthermore, with key-distribution protocols, it is possible to generate new keys periodically. In our proposal, there is every need of transmitting the keys over a network. Necessary precautions should be taken to protect the message transmitted among Asker, Helper and the organisation. However, there is every chance that an active hacker might add, delete, or modify messages over the network [11]. A good crypto system is needed to ensure that the network communication is authenticated and confidential. V. CONCLUSION The present research work is based on human relationships and social network. Vouching mechanism i.e a fourth authentication factor, namely, somebody the user knows. This vouching factor allows emergency and secure authentication in failure of three-factor systems. Besides, it can provide secure authentication in situations where a user possess a physical operative authentication token but has forgotten the corresponding PIN and vice-versa. The authenticated Asker may be provided with a temporary code based on the vouch code which is utilizable for at least one additional authentication. But the Askers should not make it a habit of multiple accesses to the system, troubling the Helper always. Therefore, our vouching system restricts multiple accesses for enrolled askers and helpers for better security. VI. FUTURE SCOPE In the future, we try to implement the vouching process in the real time environment by overcoming all the constraints. The Helper may be substituted with a machine which may provide a safe solution by validating the users to make an emergency online transaction. More secure mechanisms can be employed to authenticate the users in case of non-availability of the authentication factors. REFERENCES [1] John Brainard, Ari juels, Ronald L Rivest, Michael Szydlo, Moti Yung Fourth Factor Authentication: Somebody You Know, ACM, June [2] Schechter S, Egelman S and Reeder R.W. It's not what you know, but who you know : A Social Approach to Last- Resort Authentication. ACM SIGCHI Conference on Human Factors in Computing Systems, CHI '09. [3] Garfinkel S. L, -Based Identification and Authentication: An Alternative to PKI, IEEE Computer Society, 1, 20-26, [4] Mohamed Shehab, Said Marouf, Christopher Hudel, ROAuth: Recommendation Based Open Authorization, Proceedings of the 7th Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, July [5] J. M. McCune, A. Perrig, and M. K. Reiter, Seeing-is-believing: Using camera phones for human-verifiable authentication. In IEEE Symposium on Security and Privacy, pages , [6] Xinyi Huang, Yang Ashley Chonka, Jianying Zhou, and Robert H. Deng A Generic Framework for Three-Factor Authentication Preserving Security and Privacy in Distributed Systems, IEEE Xplore, June
8 [7] Jiri Sobotka, Radek Dolze, elektro revue, Multifactor Authentication Systems, December 2010, pages. 1-7 [8] [8] Stephen S. Hamilton, Martin C. Carlisle, and John A. Hamilton, A Global Look at Authentication, Proceedings of the 2007 IEEE SMC Information Assurance Workshop, West Point NY, June [9] Fadi Aloul, Syed Zahidi, Wassim El-Haj Two Factor Authentication Using Mobile Phones, Proceedings of the IEEE International Conference on Computer Systems and Applications, AICCSA, page IEEE,2009. [10] V. Boyko, P. MacKenzie, and S.Patel. Provably secure password-authenticated key exchange using diffiehellman. In Advances in Cryptology - Eurocrypt, pages 156, LNCS No. 1807, Berlin, Springer-Verlag. [11] Xiao-Min Wang, Wen-Fang Zhang, Jia-Shu Zhang, Muhammad Khurram Khan Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards, online 16 January 2007 [12] K. Yee and K Sitaker, Passpet: Convenient Password Management and Phishing Protection, in the Symposium on Usable Privacy and Security July 12-14, 2006, Pittsburgh, PA. [13] C.T. Clancy, N. Kiyavash, and D. J. Lin, Secure Smartcard-Based Fingerprint Authentication, in Workshop on Biometric Methods and Applications 7 November, [14] A. Bhargav-Spantzel, A. Squicciarini, and B. Elisa, Privacy Preserving Multi-Factor Authentication with Biometrics, pages 63-71, DIM November 3, 2006, Alexandria Virginia. [15] A. Jain, L. Hong, and S. Pankanti. Biometric Identification, in Communications of the ACM 43 No. 2, pages 91-98, February, [16] RSA White Paper. RSA SecureID Authenticators, Available: < [17] A. K. Abdullah, Protecting Your Good Name: Identity Theft and its Prevention. In InfoSecCD Conference, Oct. 8th, 2004, Kennesaw, GA. [18] Yagiz Sutcu,Hursrev Taha Sencar,Nasir Memon, A Secure Biometric Authentication Scheme Based On Robust Hashing, Proceedings of the 7th workshop on Multimedia and security, page , ACM, 2005, New York, USA. 262
A SECURE COMMUNICATION IN SMART PHONES USING TWO FACTOR AUTHENTICATIONS
A SECURE COMMUNICATION IN SMART PHONES USING TWO FACTOR AUTHENTICATIONS Soumya Murali 1, Anitha.B 2, Anitha Mary Paul 3 1, 2, 3 Assistant Professor, 1, 2 Sree Buddha College of Engineering, Pattoor, Alappuzha,
Multifactor authentication systems Jiří Sobotka, Radek Doležel
Multifactor authentication systems Jiří Sobotka, Radek Doležel Fakulta elektrotechniky a komunikačních technologií VUT v Brně Email: [email protected] Fakulta elektrotechniky a komunikačních technologií
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Rahul Kale Neha Gore Kavita Nilesh Jadhav Mr. Swapnil Shinde Bachelor s Degree program in Information Technology Engineering
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Protected Cash Withdrawal in Atm Using Mobile Phone
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar
Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin
Multi-Factor Authentication
Enhancing network security through the authentication process Multi-Factor Authentication Passwords, Smart Cards, and Biometrics INTRODUCTION Corporations today are investing more time and resources on
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications G.Prakash #1, M.Kannan *2 # Research Scholar, Information and Communication Engineering, Anna University
MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
User Authentication Guidance for IT Systems
Information Technology Security Guideline User Authentication Guidance for IT Systems ITSG-31 March 2009 March 2009 This page intentionally left blank March 2009 Foreword The User Authentication Guidance
A Survey on Untransferable Anonymous Credentials
A Survey on Untransferable Anonymous Credentials extended abstract Sebastian Pape Databases and Interactive Systems Research Group, University of Kassel Abstract. There are at least two principal approaches
Internet Banking Two-Factor Authentication using Smartphones
Internet Banking Two-Factor Authentication using Smartphones Costin Andrei SOARE IT&C Security Master Department of Economic Informatics and Cybernetics Bucharest University of Economic Studies, Romania
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
Security Levels for Web Authentication using Mobile Phones
Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se
SECUDROID - A Secured Authentication in Android Phones Using 3D Password
SECUDROID - A Secured Authentication in Android Phones Using 3D Password Ms. Chandra Prabha K M.E. Ph.D. 1, Mohamed Nowfel 2 E S, Jr., Gowtham V 3, Dhinakaran V 4 1, 2, 3, 4 Department of CSE, K.S.Rangasamy
ADVANCE AUTHENTICATION TECHNIQUES
ADVANCE AUTHENTICATION TECHNIQUES Introduction 1. Computer systems and the information they store and process are valuable resources which need to be protected. With the current trend toward networking,
An Enhanced Countermeasure Technique for Deceptive Phishing Attack
An Enhanced Countermeasure Technique for Deceptive Phishing Attack K. Selvan 1, Dr. M. Vanitha 2 Research Scholar and Assistant Professor, Department of Computer Science, JJ College of Arts and Science
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
International Journal of Software and Web Sciences (IJSWS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
One Time Password Generation for Multifactor Authentication using Graphical Password
One Time Password Generation for Multifactor Authentication using Graphical Password Nilesh B. Khankari 1, Prof. G.V. Kale 2 1,2 Department of Computer Engineering, Pune Institute of Computer Technology,
etoken Single Sign-On 3.0
etoken Single Sign-On 3.0 Frequently Asked Questions Table of Contents 1. Why aren t passwords good enough?...2 2. What are the benefits of single sign-on (SSO) solutions?...2 3. Why is it important to
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
Multi Factor Authentication Using Mobile Phones
International Journal of Mathematics and Computer Science, 4(2009), no. 2, 65 80 Multi Factor Authentication Using Mobile Phones M CS Fadi Aloul 1, Syed Zahidi 1, Wasim El-Hajj 2 1 Department of Computer
Two-Factor Authentication and Swivel
Two-Factor Authentication and Swivel Abstract This document looks at why the username and password are no longer sufficient for authentication and how the Swivel Secure authentication platform can provide
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
It s All About Authentication
It s All About Authentication An information security white paper to help focus resources where they produce the best results. March 2005 Author: Doug Graham, CISSP Senior Director Blue Ridge Networks,
Moving to Multi-factor Authentication. Kevin Unthank
Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India
3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Ahmed Arara 1, El-Bahlul Emhemed Fgee 2, and Hamdi Ahmed Jaber 3 Abstract This paper suggests an advanced two-factor authentication
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
Secure Web Access Solution
Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
An Approach towards Security in Private Cloud Using OTP
An Approach towards Security in Private Cloud Using OTP Vishal Paranjape 1, Vimmi Pandey 2 1 PG Student, MTECH (CSE), Gyan Ganga College of Technology, Jabalpur, Madhya Pradesh, India 2 Head of Department
What the Future of Online Banking Authentication Could Be
Universal Banking Solution System Integration Consulting Business Process Outsourcing Banking on Internet and mobile is gaining popularity The Pew Internet & American Life Project Tracking survey of December
A Security Survey of Strong Authentication Technologies
A Security Survey of Strong Authentication Technologies WHITEPAPER Contents Introduction... 1 Authentication Methods... 2 Classes of Attacks on Authentication Mechanisms... 5 Security Analysis of Authentication
solutions Biometrics integration
Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
THE FUTURE OF MOBILE SECURITY http://www.cs-networks.net
http://www.cs-networks.net 1 The Future Of Mobile Security Stefan Certic CS Network Solutions Limited http://www.cs-networks.net 2 Introduction Mobile devices are more than just phones, they are a lifeline
A Generic Framework for Three-Factor Authentication
A Generic Framework for Three-Factor Authentication Jiangshan Yu 1 Guilin Wang 2 Yi Mu 2 Wei Gao 3 1 School of Computer Science University of Birmingham, UK 2 School of Computer Science and Software Engineering
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012
Strong authentication of GUI sessions over Dedicated Links ipmg Workshop on Connectivity 25 May 2012 Agenda Security requirements The T2S U2A 2 Factor Authentication solution Additional investigation Terminal
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
AUTHENTICATION FOR ONLINE TRANSACTIONS USING TOKENS VIA MOBILE PHONES 1
1064 AUTHENTICATION FOR ONLINE TRANSACTIONS USING TOKENS VIA MOBILE PHONES 1 P.M.D.ALI KHAN, 2 T.K.LAKSHMI, 3 P.J. SARACHANDRIKA Asst.professor, C.S.E, S.V.College of Engineering, TPT Asst.Professor I.T,
International Conference on Web Services Computing (ICWSC) 2011 Proceedings published by International Journal of Computer Applications (IJCA)
Issues and Challenges in Ensuring Trust, Security, Performance and Scalability in a Common Multi-Banking Solution Sree Rekha.G Research Assistant, CORI, PESIT, Bangalore. V.K.Agrawal, Director, CORI, PESIT,
Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle
DOI 10.4010/2014.282 ISSN-2321-3361 2014 IJESC Research Article Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle R.Saisrikanth Department of Computer Science and Engineering
Security and Privacy Risks of Using E-mail Address as an Identity
Security and Privacy Risks of Using E-mail Address as an Identity Lei Jin, Hassan Takabi, James B.D. Joshi School of Information Sciences University of Pittsburgh Pittsburgh, PA, US [email protected], {hatakabi,
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
Hard vs. Soft Tokens Making the Right Choice for Security
Hard vs. Soft Tokens Making the Right Choice for Security HSTE-NB0012-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Two Factor Authentication Using Smartphone Generated One Time Password
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 2 (May. - Jun. 2013), PP 85-90 Two Factor Authentication Using Smartphone Generated One Time Password
The Benefits of an Industry Standard Platform for Enterprise Sign-On
white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed
ABSTRACT I. INTRODUCTION
Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge
White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication
White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication Page 1 of 8 Introduction As businesses and consumers grow increasingly reliant on the Internet for conducting
Implementing Identity Provider on Mobile Phone
Implementing Identity Provider on Mobile Phone Tsuyoshi Abe, Hiroki Itoh, and Kenji Takahashi NTT Information Sharing Platform Laboratories, NTT Corporation 3-9-11 Midoricho, Musashino-shi, Tokyo 180-8585,
A secure email login system using virtual password
A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {[email protected]} 2 SVNIT, Surat,Gujarat,India 2 {[email protected]}
A puzzle based authentication method with server monitoring
A puzzle based authentication method with server monitoring GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
Biometric SSO Authentication Using Java Enterprise System
Biometric SSO Authentication Using Java Enterprise System Edward Clay Security Architect [email protected] & Ramesh Nagappan CISSP Java Technology Architect [email protected] Agenda Part 1 : Identity
Authentication Levels. White Paper April 23, 2014
Summary White Paper April 23, 2014 This document describes levels of authentication that can be utilized for users known and unknown to gain access to applications and solutions. Summary... 1 Description...
ATM Transaction Security Using Fingerprint/OTP
ATM Transaction Security Using Fingerprint/OTP 1 Krishna Nand Pandey, 2 Md. Masoom, 3 Supriya Kumari, 4 Preeti Dhiman 1,2,3,4 Electronics & Instrumentation Engineering, Galgotias College of Engineering
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department
PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PASSWORD MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology FREDRIK ANDERSSON Department of Computer Science and Engineering CHALMERS UNIVERSITY
Authentication Tokens
State Capitol P.O. Box 2062 Albany, NY 12220-0062 www.its.ny.gov New York State Information Technology Standard IT Standard: Authentication Tokens No: NYS-S14-006 Updated: 05/15/2015 Issued By: NYS ITS
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
WHITE PAPER. Let s do BI (Biometric Identification)
WHITE PAPER Let s do BI (Biometric Identification) Fingerprint authentication makes life easier by doing away with PINs, passwords and hint questions and answers. Since each fingerprint is unique to an
Journal of Internet Banking and Commerce
Journal of Internet Banking and Commerce An open access Internet journal (http://www.arraydev.com/commerce/jibc/) Journal of Internet Banking and Commerce, April 2012, vol. 17, no. 1 (http://www.arraydev.com/commerce/jibc/)
A Method of Risk Assessment for Multi-Factor Authentication
Journal of Information Processing Systems, Vol.7, No.1, March 2011 DOI : 10.3745/JIPS.2011.7.1.187 A Method of Risk Assessment for Multi-Factor Authentication Jae-Jung Kim* and Seng-Phil Hong** Abstract
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Second Level Authentication Using QR Codes
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 5, Number 2 (2013), pp. 43-50 International Research Publication House http://www.irphouse.com Second Level Authentication
Two-Factor Authentication Making Sense of all the Options
Two-Factor Authentication Making Sense of all the Options The electronic age we live in is under attack by information outlaws who love profiting from the good record of others. Now more than ever, organizations
Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication Tokenless authenticators guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services
Alternative authentication what does it really provide?
Alternative authentication what does it really provide? Steve Pannifer Consult Hyperion Tweed House 12 The Mount Guildford GU2 4HN UK [email protected] Abstract In recent years many new technologies
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
