A General Approach of Authentication Scheme and its Comparative Study

Sanjeev Kumar Mandal, A. R Deepti

Abstract


The field of information security is a vast area which is continually evolving and expanding relative to network data and global communication security. This literature review contrasts the research that has been published in the area of cryptography and authentication protocols, by providing a comparative and analytical study to secure the web servers and services.


Keywords


Authentication; Certificate based authentication; Zero knowledge proof; Single sign on with windows.

Full Text:

PDF

References


L.C.K. Hui, J.C.K. Yau, E.K. Wang, S.M. Yiu, Z.L. Jiang. The WHO Hardware Token Security Model. In June 26, 2006, HKU CS.

Kingpin Attacks on and Countermeasures for USB Hardware Token Devices. 196 Broadway, Cambridge, MA 02139, USA.

Manav Singhal and Shashikala Tapaswi, “Software Tokens Based Two Factor Authentication Scheme.” in International Journal of Information and Electronics Engineering, Vol. 2, No. 3, May 2012.

LiPing Du, JianWei Guo Ying Li. “Research on Micro-Certificate based Authentication Protocol.” Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013).

Karthik Sadasivam, T. Andrew Yang. Evaluation of Certificate-Based Authentication in Mobile ad hoc Networks. University of Houston-Clearlake Houston, TX, USA.

Davaanaym, Y.S. Lee, H.J. Lee, S.G. Lee, and H.T. Lim. “A ping pong based one-time-passwords authentication system.” In 2009 Fifth International Joint Conference (NCM ’09) on INC, IMS and IDC, pages 574–579. IEEE Computer Society, 2009.

Yeen-Yin Choong, Kristen K. Greene, Mary F. Theofanos, “Authentication and Lifecycle Management.” Internet: www.pages.nist.gov/800-63-3/sp800-63b.html, [TBD 2017].

U. Fiege, A. Fiat, A. Shamir. “Zero Knowledge Proofs of Identity.” in Proceedings of ACM Symposium on Theory of Computing (STOC), 1987.

Microsoft. “Microsoft NTLM.” Internet: https://msdn.microsoft.com/enus/library/windows/desktop/aa378749 (v=vs.85).aspx.

Eman El-Emam, Magdy Koutb, Hamdy Kelash, and Osama Farag Allah. “A Network Authentication Protocol Based on Kerberos.” IJCSNS International Journal of Computer Science and Network Security, Vol.9 No.8, August 2009.

Sanket Bhat, Damle, Priyanka Chaudhari, Abhijeet. “An Authentication Protocol.” International Journal of Advance Research in Computer Science and Management Studies, [On-line]. Volume 2, Issue 2, Available: www. ijarcsms.com/docs/paper/volume2/issue2/V2I2-0081.pdf February 2014.

L. Gong, M. Lomas, R. Needham, and J. Saltzer, “Protecting Poorly Chosen Secrets from Guessing Attacks." IEEE Journal on Selected Areas in Communications, [On-line]. Vol. 11, No. 5, June 1993, pp.648-656, Available: www.pdfs.semanticscholar.org/6b47/9047219fc565a478efbe95572806cd03a7a1.pdf.

M. Bellare, D. Pointcheval, P. Rogaway, “Authenticated key exchange secure against dictionary attacks.” in Advances in Cryptology— Eurocrypt 2000, Vol. 1807, Springer, Berlin, 2000, pp. 139–155.

S. M. Bellovin and M. Merritt, “Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise." in Proc. of the First ACM Conference on Computer and Communications Security, 1993, pp. 244-250.

M. Steiner, G. Tsudik, and M. Waidner, “Refinement and Extension of Encrypted Key Exchange." ACM Conference on Operating Systems Review, vol. 29, Iss. 3, pp. 22- 30 July 1995.

Manav Singhal and Shashikala Tapaswi, “Software Tokens Based Two Factor Authentication Scheme.” in International Journal of Information and Electronics Engineering, Vol. 2, No. 3, May 2012.


Refbacks

  • There are currently no refbacks.


 

 
  

 

  


About IJC | Privacy PolicyTerms & Conditions | Contact Us | DisclaimerFAQs 

IJC is published by (GSSRR).