M-Pass: Web Authentication Protocol Resistant to Malware and Phishing
|
|
|
- Marjory Reed
- 9 years ago
- Views:
Transcription
1 M-Pass: Web Authentication Protocol Resistant to Malware and Phishing Ajinkya S. Yadav M.E.student, Department of Computer Engineering. Pune University, Pune A. K.Gupta Professor, Department of Computer Engineering Pune University, Pune. ABSTRACT In this digital world all information and data is kept safe by passwords. The simple and convenient format of password is in the form of text. But, text passwords are not always strong enough and under different vulnerabilities they are very easily stolen and changed. When a person creates a weak password or same password is reused in many sites it may be possible that others can acquire that password. If one password is stolen, then it is possible that it can be used for all the websites. This phenomenon is known as the Domino Effect. Another possible risky attacks are related to phishing, malware and key loggers etc. A protocol is designed which makes use of the user s customer s mobile i.e. cellular phone and SMS (short message service) to ensure protection against password stealing attacks. This user authentication protocol is named as m-pass. The unique phone number is required which will be possessed by each participating website. The telecommunication service provider plays important role in the registration and the recovery phases. The main theme is to reduce the password reuse attack. It works with one time password technology, and results in reduction of the password validity time. The results show improvement in performance of the security. Keywords Network Security, m-pass, Phishing, authentication 1. INTRODUCTION Internet and network services play vital role in today s digital world. The various web services are like online banking, social networks, cloud computing. For the security and authentication purpose of user needs a password. Mostly text based password is used. While registering accounts on a website, user selects his username and text password. In order to log into the website successfully, user must recall the selected passwords. To provide sufficient entropy, if users select strong passwords, then user authentication based on password can resist attacks like brute force attack and dictionary attack. However, a major problem is, password based user authentication involves humans and they are not experts in memorizing text strings. So the weak passwords (i.e. easy-to-remember passwords) would be chosen by most users even if they know the passwords might be unsafe. It is found that, the users tend to reuse passwords across various websites. This is another crucial problem. Reuse of Password causes users to lose sensitive information stored in different websites, if a hacker compromises one of their passwords. This attack is said to be the password reuse attack. Such problems are caused by the negative influence of the human factors. The various technologies are invented to reduce the negative impact of the human factors in the user authentication procedure. Since humans have adept nature in remembering graphical passwords than text passwords, there were many techniques related to graphical password designed to notify human s problem of password recalling [6]. Making use of password management tools is an alternative approach. These tools can be used to automatically generation of the strong passwords for each website. It points out problems of password reuse and password recall problems. Due to this, users have to remember only one master password to access the management tool; this is an advantage [2].The another attack is related to the password stealing. Adversaries steal or compromise passwords. They may impersonate users identities to collect sensitive information, to launch malicious attacks, perform unauthorized payment actions and they may leak financial secrets. The most common and efficient password stealing attack is Phishing. Some researches focus on three-factor authentication rather than password-based authentication to provide more reliable user authentication. The previously three-factor authentication system depends on what user knows i.e. password, what user have i.e., token, and who user is i.e., biometric). To pass on the authentication function, the user must have to input a password and provide a pass code generated by the token (e.g., RSA), and scan his biometric features (e.g., fingerprint or pupil). Three-factor authentication is a comprehensive defense mechanism against the attacks like password stealing, however it requires comparative high cost. Compared to three-factor authentication, two-factor authentication is more attractive and practical. Although twofactor authentication is supported by many banks, it still suffers from the bad influence of human factors, like the password reuse attack. Another factor is, users have to memorize another fourdigit PIN code to work together with the token, for example RSA Secure ID. The proposed system gives a web authentication protocol (m-pass) which combines the user s cell phone and short message service (SMS) to prevent the password reuse and password stealing attacks. The proposed system state that the main cause of stealing password attacks is when users type passwords to untrusted public computers. The main concept of m-pass is to free users from having to remember or type any passwords into conventional computers for authentication. The authentication system i.e. M-Pass involves a new instrument, i.e. the cell phone, which is used to generate one-time passwords. It has a new communication channel, i.e. SMS, which is used to transmit authentication messages. m-pass presents the following advantages. 1) Anti-malware Malware (e.g., key logger) gathers sensitive information from users, like their password [1]. In m- Pass, users are able to log into web services without entering passwords on their computers. Due to this change, malware is not able to obtain a user s information like password from untrusted computers. 2) Phishing Protection Phishing attacks are launched by adversaries to steal users passwords by cheating users when they connect to forged websites. M-Pass successfully allows users to log into the websites without disclosing or revealing passwords to computers. Users who adopt m-pass are guaranteed to prevention of phishing attacks. 3) Password Reuse Prevention and Weak Password Avoidance m-pass achieves one-time password approach. For 1
2 each login, the cell phone automatically derives different passwords; i.e. the password is different during each login [3]. In this approach, users do not need to remember any password for login. They only keep a long term password for accessing their cell phones, and leave the rest of the work to m-pass. 4) Cell phone Protection An adversary can breach user authentication by stealing user s cell phones. However, the cell phones are protected by a long-term password. The adversary cannot impersonate a legal user to login without being detected. 2. LITERATURE SURVEY The previous studies shows how different researchers made work on have to protect user secret information or credentials from phishing attacks in user authentication. The proposed systems leverage variable technologies, for example, mobile devices,including the trusted platform module (TPM), or public key infrastructure (PKI). However, these solutions were short of considering the human s bad influence, such as password reuse and weak password problems. A well-known approach is MP- Auth protocol presented by Mannan and Oorschot in 2007 [9]. To strengthen password-based authentication in untrusted environments, MP-Auth forces the input of a long-term secret (mostly a user s text password) through a trusted mobile device [1]. Before sending the password to an untrusted kiosk, the password is encrypted by the already installed public key on a remote server. MP-Auth is intended to guard passwords from attacks raised by untrusted kiosks, which may include key loggers and malware. In spite of that, MP-Auth suffers from password reuse vulnerability. An attacker can compromise a weak server, e.g., a server without security features, to obtain a user s information and exploit it to gain his access rights of different websites. On another side, MP-Auth assumes that password and account system setup is secure. Then it is necessary that users should setup an account and password via physical contact, like banks which are requiring users to initialize their account personally or send passwords though postal service. In m-pass, it addresses above weakness and removes this assumption. M-Pass system attains one-time password approach to diminish the password reuse problem, and involves a TSP to ensure that the registration and recovery phase is secure. Parno utilized mobile devices i.e. cellphones as an authentication tokens to build an anti-phishing mechanism, named as Phoolproof, between mutual authentication between users and websites. While logging on to the website, a user should provide the issued public key and username/password combination. But previous study shown that Phoolproof is still vulnerable to the problems like password reuse. It needs physical contacts to ensure that account setup is secure. On the contrary, some research represents different approaches to prevent phishing attacks. Session Magnifier enables the browser on a mobile device which is extended and a regular browser on a public computer. It creates collaboratively a secure web session. User access to sensitive interactions is separated by Session magnifier from regular interactions. For important communication, the content is sent to the extended browser on the user s mobile device for further confirmation from a user. Another avenue is adopting TPM. The author [4] designed a bump in the ether (BitE) based on TPM. Via BitE, user inputs are protected under an encrypted tunnel. This tunnel is in between the mobile device and on a TPM-equipped untrusted computer where the application running. Many of recent systems require involvement of users in certificate confirmation (UICC) in order to setup a secure SSL tunnel. 3. PROPOSED SYSTEM The proposed user authentication system, called as m-pass, to thwart the attacks like Phishing, Malware etc. The goal of m- Pass is to prevent users from typing their memorized passwords into kiosks. By using one-time passwords, which reflects that password information is no longer important. When the user completes the current session, the one-time password is expired. Instead of using Internet channels, m-pass leverages SMS and user s cell phones to avoid password stealing attacks. Compared to internet channels, it believes SMS is a suitable and secure medium between cell phones and websites to transmit important information. Based on SMS, a user identity on untrusted kiosk is authenticated by websites without inputting any passwords. Use of the password is only to restrict access on the user s cell phone. In m-pass, each user needs to simply memorize a long-term password for access his cell phone. The long-term password is used to protect the information on the cell phone from a thief. Figure 1 describes the architecture (and environment) of the m- Pass system. To perform secure login on an untrusted computer (kiosk), m-pass consists of a trusted cell phone, a browser on the kiosk, and a web server that users wish to access. To accomplish secure logins to the web server, the user operates his cell phone and the untrusted computer directly. The communication is possible through the SMS channel. The web browser interacts with the web server via the Internet. In our protocol design, it requires the cell phone interact directly with the kiosk. The basic way is to select available interfaces on the cell phone, SMS. The system has following phases; Registration Phase, Login Phase and Recovery Phase. 3.1 Registration Phase In this phase, the user and a server negotiate a shared secret to authenticate succeeding logins for this user. The m-pass program installed on his cell phone is opened by the user. The user enters ID u (account id she prefers) and IDs to the program. The mobile program sends ID u and ID s to the telecommunication service provider (TSP). This is done through a 3G connection which makes a request of registration. Once the TSP received the ID u and the IDs, it can trace the user s phone number T u based on SIM card used by user. After that TSP is used to distribute a shared key K sd which plays the role of third-party between the user and the server. To encrypt the registration SMS with AES- CBC, the shared key is used. To protect the communication, the TSP and the server S will establish an SSL tunnel. Then the TSP forwards ID u, K sd, T u, and to the assigned server S. Server will generate the corresponding information for this account a response, including server s identity IDs, a random seed ø, and server s phone number T s. The TSP then forwards ID s, ø,ts, and a shared key K sd to the user s cell phone. After reception of the response is finished, the user continues to setup a long-term password P u with his cell phone. 2
3 Table 1. Comparison of M-Pass with previous techniques Attack Prevention Requirements Phishing Key logger Password reuse UICC Physical account setup Logical account setup Ondevice secret Malware free mobile m-pass MP-Auth Phoolproof Session magnifier BitE User Untrusted Kiosk Web Server Cell Phone Fig.1. Architecture of m-pass system The cell phone computes a secret credential C by the following operation: Open registration C= H( P u ǁ ID s ǁ ø ). 3.2 Login Phase The login begins when the user u sends a request to the server S through an untrusted browser (on a kiosk). The user uses his cell phone to produce a one-time password, e.g., δi. Then delivers necessary information encrypted with δi to server S via an SMS message. Server S can verify and authenticate user u based on δi, based on pre shared secret credential C, The protocol is started when the user u wishes to log into his already registered favourite web server S. However, user u begins with the login procedure by accessing the specific website via a browser on an untrusted kiosk. Then the browser sends a request to S with u s account ID u. Next, server S supplies the IDs and fresh nonce ns to the browser. Meanwhile, this message is forwarded to the cell phone through SMS or wireless interfaces. Fill out form and submit by phone Input long term password into phone and submit Registration success Fig.2. Registration phase After receiving the message, the cell phone inquires related information from its database via IDs, which includes server s phone number and other parameters. The next step is promoting a dialog for the long-term password. Secret shared 3
4 information can regenerate by providing the correct on the cell phone. The OTP i.e. one-time password for current login is recomputed using the following operations: C= H( P u ǁ ID s ǁ ø ). δi= H n-i (c). 3.3 Recovery Phase The recovery phase is designated for some specific conditions; for example, a user u may lose his cell phone. The protocol is able to recover m-pass setting on his new cell phone assuming he still uses the same phone number (apply a new SIM card with old phone number). After the user u installs the m-pass program on his new cell phone, he can launch the program to send a recovery request with his account ID s and requested server ID s through the 3G connection is to predefined TSP. Open login page to the server S for checking. Similarly, the server S computes δi +1 and decrypts this message to ensure that user u is already recovered. At this point, his new cell phone is recovered and ready to perform further logins in the system. Continuing for the next login, one-time password is used for the user authentication. Open recovery form Fill out form and submit by browsers Enter long term password and submit Enter account ID and submit Recovery success Launch software 4. RESULTS Fig.4. Recovery phase Receive message No Yes Login success Fig.3. Login phase As mentioned before, ID s can be the domain name or URL link of server. Similar to registration, TSP can trace his phone number T u based on his SIM card and forward his account ID s and the T u to server through an SSL tunnel. Once server S receives the request, S probes the account information in its database to confirm if account u is registered or not. If account ID u exists, the information used to compute the secret credential c will be fetched and be sent back to the user. The server S generates a fresh nonce n s and replies a message which consists of ID s, ø, T s, i, and S. The message includes all important fieldss for generating the next one-time passwords to the user u. When the mobile program receives the message, like registration, to reproduce the correct one-time password δi +1, it forces the user u to enter his long-term password [7]. During the final step, the user s cell phone encrypts the secret credential c and server nonce n s to a cipher text. The recovery SMS message is delivered back Fig.5. Results As shown in Fig.5, the proposed system of m-pass is implemented. In the system, the Registration and Login phase have been shown which guides to user for the authentication service protocol which creates OTP i.e. One Time Password. 4
5 6. CONCLUSION A user authentication protocol i.e. m-pass leverages cell phones and SMS to prevent password stealing and password reuse attacks. The assumption it makes is that each website possesses a unique phone number. The important principle of the proposed system i.e. m-pass is to eliminate the negative influence of human factors as much as possible. Because of m-pass, each user only needs to memorize the long-term password which has been used to protect his cell phone. Users are free from typing any passwords into untrusted computers for the sake of login on all websites. Compared with previous schemes, m-pass is the first user authentication protocol to prevent password stealing and password reuse attacks simultaneously. The reason is that the m- Pass adopts the one-time password way to ensure independence between each and every login. Password recovery is also considered to make m-pass fully functional. When users lose their cell phones password recovery plays it s role. 7. ACKNOWLEDGEMENT It is a pleasure for me to thank many people who in different ways have supported and guided me. I would like to thank my Guide, Prof. A. K. Gupta; PG coordinator, Prof. M. D. Ingle, all my teachers, Principal Dr. M. G. Jadhav. I would also like to express my gratitude to all my colleagues for their support, cooperation, my family and friends for their sincere interest in my study and their moral support. 8. REFERENCES [1] Hung-Min Sun, Yao-Hsin Chen, and Yue-Hsin Lin opass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attack, in IEEE Transaction Vol 7, No.2, April [2] S. Gawand E. W. Felten, Password management strategies for online accounts, in SOUPS 06: Proc. 2nd Symp. Usable Privacy. Security, New York, 2006, pp , ACM. [3] D. Florencio and C. Herley, A large-scale study of web password habits, in WWW 07: Proc. 16th Int. Conf. World Wide Web, New York, 2007, pp , ACM. [4] B. Ives, K. R. Walsh, and H. Schneider, The domino effect of password reuse, Commun. ACM, vol. 47, no. 4, pp , [5] S. Chiasson, A. Forget, E. Stobert, P. C. van Oorschot, and R. Biddle, Multiple password interference in text passwords and click-based graphical passwords, in CCS 09: Proc. 16th ACM Conf. Computer Communications Security, New York, 2009, pp , ACM [6] I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, The design and analysis of graphical passwords, in SSYM 99: Proc. 8 th Conf. USENIX Security Symp., Berkeley, CA, 1999, pp. 1 1, USENIX Association. [7] A. Perrig and D. Song, Hash visualization: A new technique to improve real-world security, in Proc. Int.Workshop Cryptographic Techniques E-Commerce, Citeseer, 1999, pp [8] S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, Passpoints: Design and longitudinal evaluation of a graphical password system, Int. J. Human-Computer Studies, vol. 63, no. 1 2, pp , [9] Mohammad Mannan, University of Toronto, Canada, and P.C. van Oorschot, Carleton University, Canada Leveraging Personal Devices for Stronger Password Authentication from Untrusted Computers [10] S. Wiedenbeck, J. Waters, L. Sobrado, and J.-C. Birget, Design and evaluation of a shoulder-surfing resistant graphical password scheme, in AVI 06: Proc. Working Conf. Advanced Visual Interfaces, New York, 2006, pp , ACM. IJCA TM : 5
Universal Multi-Factor Authentication Using Graphical Passwords
Universal Multi-Factor Authentication Using Graphical Passwords Alireza Pirayesh Sabzevar, Angelos Stavrou Computer Science Department, George Mason University, Fairfax, Virginia, 22030 {apirayes, astavrou}@gmu.edu
Two-Factor Authentication and Swivel
Two-Factor Authentication and Swivel Abstract This document looks at why the username and password are no longer sufficient for authentication and how the Swivel Secure authentication platform can provide
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
Securing ATM Using Graphical Password Authentication Scheme
Securing ATM Using Graphical Password Authentication Scheme Sonia Rathi 1, Raunak Chitnis 2, Ramakant Yadav 3, Mrs. M.V.Bhosle 4 1 (Department Of Information Technology, Marathwada Mitra Mandal s Institute
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
True Identity solution
Identify yourself securely. True Identity solution True Identity authentication and authorization for groundbreaking security across multiple applications including all online transactions Biogy Inc. Copyright
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
A Study and Evaluation of Different Authentication Methods and Protocols 1 K. Arthi, 2 N.M. Nandhitha, 3 S.Emalda Roslin
A Study and Evaluation of Different Authentication Methods and Protocols 1 K. Arthi, 2 N.M. Nandhitha, 3 S.Emalda Roslin 1 Final year software engineering student, Sathyabama University 2 Head/ Academics,Dept.
Secure Web Access Solution
Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...
WebCallerID: Leveraging cellular networks for Web authentication
Journal of Computer Security 19 (2011) 869 893 869 DOI 10.3233/JCS-2011-0424 IOS Press WebCallerID: Leveraging cellular networks for Web authentication Francis Hsu a, Hao Chen a, and Sridhar Machiraju
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
An Innovative Two Factor Authentication Method: The QRLogin System
An Innovative Two Factor Authentication Method: The QRLogin System Soonduck Yoo*, Seung-jung Shin and Dae-hyun Ryu Dept. of IT, University of Hansei, 604-5 Dangjung-dong Gunpo city, Gyeonggi do, Korea,
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur
Security Levels for Web Authentication using Mobile Phones
Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se
International Journal of Software and Web Sciences (IJSWS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
3D-WEBAUTHEN: HIGH DEGREE OF AUTHENTICATION FOR WEB APPLICATION DEVELOPMENT
3D-WEBAUTHEN: HIGH DEGREE OF AUTHENTICATION FOR WEB APPLICATION DEVELOPMENT Waraporn Viyanon Computer Science Program, Department of Mathematics Faculty of Science, Srinakharinwirot University Bangkok,
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
A secure email login system using virtual password
A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {[email protected]} 2 SVNIT, Surat,Gujarat,India 2 {[email protected]}
Awase-E: Image-based Authentication for Mobile Phones using User s Favorite Images
Awase-E: Image-based Authentication for Mobile Phones using User s Favorite Images Tetsuji TAKADA 1 and Hideki KOIKE 2 1 SONY Computer Science Laboratories Muse Bldg. 3-14-13 Higashigotanda, Shinagawa-ku,
A Security Survey of Strong Authentication Technologies
A Security Survey of Strong Authentication Technologies WHITEPAPER Contents Introduction... 1 Authentication Methods... 2 Classes of Attacks on Authentication Mechanisms... 5 Security Analysis of Authentication
Chapter 16: Authentication in Distributed System
Chapter 16: Authentication in Distributed System Ajay Kshemkalyani and Mukesh Singhal Distributed Computing: Principles, Algorithms, and Systems Cambridge University Press A. Kshemkalyani and M. Singhal
Security and Privacy Risks of Using E-mail Address as an Identity
Security and Privacy Risks of Using E-mail Address as an Identity Lei Jin, Hassan Takabi, James B.D. Joshi School of Information Sciences University of Pittsburgh Pittsburgh, PA, US [email protected], {hatakabi,
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Protected Cash Withdrawal in Atm Using Mobile Phone
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar
Whitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
MULTI-DIMENSIONAL PASSWORD GENERATION TECHNIQUE FOR ACCESSING CLOUD SERVICES
MULTI-DIMENSIONAL PASSWORD GENERATION TECHNIQUE FOR ACCESSING CLOUD SERVICES Dinesha H A 1 and Dr.V.K Agrawal 2 1 Assistant Professor, Department of ISE & CORI, PES Institute of Technology, Bangalore,
Contributions to Web Authentication for Untrusted Computers
Linköping Studies in Science and Technology Thesis No. 1481 Contributions to Web Authentication for Untrusted Computers by Anna Vapen Submitted to Linköping Institute of Technology at Linköping University
Hard vs. Soft Tokens Making the Right Choice for Security
Hard vs. Soft Tokens Making the Right Choice for Security HSTE-NB0012-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com
Vidder PrecisionAccess
Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...
Integration of Sound Signature in 3D Password Authentication System
Integration of Sound Signature in 3D Password Authentication System Mr.Jaywant N. Khedkar 1, Ms.Pragati P. Katalkar 2, Ms.Shalini V. Pathak 3, Mrs.Rohini V.Agawane 4 1, 2, 3 Student, Dept. of Computer
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication
White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication Page 1 of 8 Introduction As businesses and consumers grow increasingly reliant on the Internet for conducting
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications G.Prakash #1, M.Kannan *2 # Research Scholar, Information and Communication Engineering, Anna University
Providing Data Protection as a Service in Cloud Computing
International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 Providing Data Protection as a Service in Cloud Computing Sunumol Cherian *, Kavitha Murukezhan ** * Department
A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key
International Journal of Network Security, Vol.18, No.6, PP.1060-1070, Nov. 2016 1060 A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key Trung Thanh Ngo and Tae-Young
Secure Authentication of Distributed Networks by Single Sign-On Mechanism
Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,
Preventing Abuse of Cookies Stolen by XSS
Preventing Abuse of Cookies Stolen by XSS Hiroya Takahashi Kenji Yasunaga Masahiro Mambo Kwangjo Kim KAIST Korea Heung Youl Youm Soonchunhyang University Korea Abstract Cross Site Scripting (XSS) makes
Strong and Convenient Multi-Factor Authentication on Mobile Devices
Strong and Convenient Multi-Factor Authentication on Mobile Devices Francisco Corella, PhD [email protected] Karen Lewison, MD [email protected] Revised September 6, 2012 Executive Summary Authentication
Two Factor Zero Knowledge Proof Authentication System
Two Factor Zero Knowledge Proof Authentication System Quan Nguyen Mikhail Rudoy Arjun Srinivasan 6.857 Spring 2014 Project Abstract It is often necessary to log onto a website or other system from an untrusted
The Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
(IT Journal of Research, Volume 1, May 2010 SECUREZZA. Prof. Gauri Rao, Lecturer Bharati Vidyapeeth College of Engineering, Pune.
SECUREZZA Prof. Gauri Rao, Lecturer Bharati Vidyapeeth College of Engineering, Pune Abstract The current security systems and authentication systems have much weakness and are prone to break through. Textual
Two-factor Authentication
Enter only a Prove Identity Two-factor Authentication EXECUTIVE HANDBOOK 2FA With Fingerprint? PIN? Passcode? www.secsign.com INDEX 1 2 3 4 5 6 7 8 9 Data Security Breaches Overview 2014-15 Page 3 How
DIGIPASS Authentication for Sonicwall Aventail SSL VPN
DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties
Authentication Tokens
State Capitol P.O. Box 2062 Albany, NY 12220-0062 www.its.ny.gov New York State Information Technology Standard IT Standard: Authentication Tokens No: NYS-S14-006 Updated: 05/15/2015 Issued By: NYS ITS
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Ahmed Arara 1, El-Bahlul Emhemed Fgee 2, and Hamdi Ahmed Jaber 3 Abstract This paper suggests an advanced two-factor authentication
Layered security in authentication. An effective defense against Phishing and Pharming
1 Layered security in authentication. An effective defense against Phishing and Pharming The most widely used authentication method is the username and password. The advantages in usability for users offered
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
An Anti-Phishing mechanism for Single Sign-On based on QR-Code
An Anti-Phishing mechanism for Single Sign-On based on QR-Code Syamantak Mukhopadhyay School of Electronics and Computer Science University of Southampton Southampton, UK [email protected] David
XYPRO Technology Brief: Stronger User Security with Device-centric Authentication
Ken Scudder Senior Director Business Development & Strategic Alliances XYPRO Technology Talbot A. Harty CEO DeviceAuthority XYPRO Technology Brief: Stronger User Security with Device-centric Authentication
One Time Password Generation for Multifactor Authentication using Graphical Password
One Time Password Generation for Multifactor Authentication using Graphical Password Nilesh B. Khankari 1, Prof. G.V. Kale 2 1,2 Department of Computer Engineering, Pune Institute of Computer Technology,
Implementing two-factor authentication: Google s experiences. Cem Paya ([email protected]) Information Security Team Google Inc.
Implementing two-factor authentication: Google s experiences Cem Paya ([email protected]) Information Security Team Google Inc. Google services and personalization Identity management at Google 1. Internal
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes
AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
Multi-Factor Authentication of Online Transactions
Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best
MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Arcot Systems, Inc. Securing Digital Identities. FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer
Arcot Systems, Inc. Securing Digital Identities FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer Today s Agenda Background Who is Arcot Systems? What is an ArcotID? Why use
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Midterm 2 exam solutions. Please do not read or discuss these solutions in the exam room while others are still taking the exam.
CS 161 Computer Security Spring 2010 Paxson/Wagner MT2 Solns Midterm 2 exam solutions Please do not read or discuss these solutions in the exam room while others are still taking the exam. CS 161, Spring
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques
Computer Security process of reliably verifying identity verification techniques what you know (eg., passwords, crypto key) what you have (eg., keycards, embedded crypto) what you are (eg., biometric information)
An Enhanced Countermeasure Technique for Deceptive Phishing Attack
An Enhanced Countermeasure Technique for Deceptive Phishing Attack K. Selvan 1, Dr. M. Vanitha 2 Research Scholar and Assistant Professor, Department of Computer Science, JJ College of Arts and Science
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
