Security Analysis and Implementation of JUIT—Image Based Authentication System Using Kerberos Protocol

Author(s):  
Nitin ◽  
Durg Singh Chauhan ◽  
Vivek Kumar Sehgal ◽  
Ankit Mahanot ◽  
Pallavi Singh ◽  
...  
2015 ◽  
Vol 72 (5) ◽  
Author(s):  
Touraj Khodadadi ◽  
Mojtaba Alizadeh ◽  
Somayyeh Gholizadeh ◽  
Mazdak Zamani ◽  
Mahdi Darvishi

One of the most important primitive security mechanisms is the authentication system. Authentication through the use of password is a commonly utilized mechanism for authentication of users. In general, users utilize characters as their password; however, passwords based on texts are hard to recall and if the passwords are too simple and predictable, then there is the danger of being susceptible to threats. In order to overcome the problems with authentication, an alternative and new approach has been introduced utilizing images for passwords. The idea gains support from the knowledge that the human’s brain is highly capable of remembering many detailed images, however remembering texts are more difficult. Users who utilize the graphic authentication carry out certain functions on the images such as to click, drag, and movement of the mouse and so on. This research reviews several common Recognition-Based graphical password methods and analyzes their security based on the estimation criteria. Moreover, the research defines a metric that would make it possible for the analysis of the security level of the graphical passwords that are Recognition-Based. Finally, a table comparing the limits of each method based on the security level is presented. 


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Robertas Damaševičius ◽  
Rytis Maskeliūnas ◽  
Egidijus Kazanavičius ◽  
Marcin Woźniak

Cryptographic frameworks depend on key sharing for ensuring security of data. While the keys in cryptographic frameworks must be correctly reproducible and not unequivocally connected to the identity of a user, in biometric frameworks this is different. Joining cryptography techniques with biometrics can solve these issues. We present a biometric authentication method based on the discrete logarithm problem and Bose-Chaudhuri-Hocquenghem (BCH) codes, perform its security analysis, and demonstrate its security characteristics. We evaluate a biometric cryptosystem using our own dataset of electroencephalography (EEG) data collected from 42 subjects. The experimental results show that the described biometric user authentication system is effective, achieving an Equal Error Rate (ERR) of 0.024.


2014 ◽  
Vol 3 (12) ◽  
pp. 463-478 ◽  
Author(s):  
Heekyeong Noh ◽  
Changkuk Choi ◽  
Minsu Park ◽  
Seungjoo Kim

Sign in / Sign up

Export Citation Format

Share Document