SlideShare a Scribd company logo
1 of 1
Download to read offline
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR
DISTRIBUTED COMPUTER NETWORKS

ABSTRACT:

In this paper, however, we demonstrative that their scheme is actually insecure as it fails to meet
credential privacy and soundness of authentication. Specifically, we present two impersonation
attacks. The first attack allows a malicious service provider, who has successfully communicated
with a legal user twice, to recover the user’s credential and then to impersonate the user to access
resources and services offered by other service providers. In another attack, an outsider without
any credential may be able to enjoy network services freely by impersonating any legal user or a
nonexistent user. We identify the flaws in their security arguments to explain why attacks are
possible against their SSO scheme. Our attacks also apply to another SSO scheme proposed by
Hsu and Chuang, which inspired the design of the Chang–Lee scheme. Moreover, by employing
an efficient verifiable encryption of RSA signatures proposed by Ateniese, we propose an
improvement for repairing the Chang–Lee scheme.

More Related Content

Viewers also liked

Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titles
Ecwaytech
 
Automatic road crack detection and characterization
Automatic road crack detection and characterizationAutomatic road crack detection and characterization
Automatic road crack detection and characterization
Ecwaytech
 
презентация курса товароведение
презентация курса  товароведение  презентация курса  товароведение
презентация курса товароведение
Светлана Бреусова
 
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
Ecwaytech
 
Der Sport Meines Onkels
Der Sport Meines OnkelsDer Sport Meines Onkels
Der Sport Meines Onkels
prosvsports
 
Automatic clutch & braking system
Automatic clutch & braking systemAutomatic clutch & braking system
Automatic clutch & braking system
Ecwaytech
 
Automatic electricity billing and tripping for non paid customers
Automatic electricity billing and tripping for non paid customersAutomatic electricity billing and tripping for non paid customers
Automatic electricity billing and tripping for non paid customers
Ecwaytech
 
Practicas 1,2 y 3
Practicas 1,2 y 3Practicas 1,2 y 3
Practicas 1,2 y 3
gracii98
 

Viewers also liked (16)

Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titles
 
Fuzzy Inventory Model for Constantly Deteriorating Items with Power Demand an...
Fuzzy Inventory Model for Constantly Deteriorating Items with Power Demand an...Fuzzy Inventory Model for Constantly Deteriorating Items with Power Demand an...
Fuzzy Inventory Model for Constantly Deteriorating Items with Power Demand an...
 
Automatic road crack detection and characterization
Automatic road crack detection and characterizationAutomatic road crack detection and characterization
Automatic road crack detection and characterization
 
презентация курса товароведение
презентация курса  товароведение  презентация курса  товароведение
презентация курса товароведение
 
AJP Reference
AJP ReferenceAJP Reference
AJP Reference
 
Test
TestTest
Test
 
How to Keep Perspective on Your Journey
How to Keep Perspective on Your JourneyHow to Keep Perspective on Your Journey
How to Keep Perspective on Your Journey
 
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...Android  ssd a robust rf location fingerprint addressing mobile devices’ hete...
Android ssd a robust rf location fingerprint addressing mobile devices’ hete...
 
Der Sport Meines Onkels
Der Sport Meines OnkelsDer Sport Meines Onkels
Der Sport Meines Onkels
 
Automatic clutch & braking system
Automatic clutch & braking systemAutomatic clutch & braking system
Automatic clutch & braking system
 
Indicadores
IndicadoresIndicadores
Indicadores
 
Sandel Assc Toronto - Gigabit City Economic Development - January 10 2014 -...
Sandel Assc   Toronto - Gigabit City Economic Development - January 10 2014 -...Sandel Assc   Toronto - Gigabit City Economic Development - January 10 2014 -...
Sandel Assc Toronto - Gigabit City Economic Development - January 10 2014 -...
 
Automatic electricity billing and tripping for non paid customers
Automatic electricity billing and tripping for non paid customersAutomatic electricity billing and tripping for non paid customers
Automatic electricity billing and tripping for non paid customers
 
Help! My Hadoop doesn't work!
Help! My Hadoop doesn't work!Help! My Hadoop doesn't work!
Help! My Hadoop doesn't work!
 
Practicas 1,2 y 3
Practicas 1,2 y 3Practicas 1,2 y 3
Practicas 1,2 y 3
 
A Robust Model for Thegrowth of the Nigerian Population
A Robust Model for Thegrowth of the Nigerian PopulationA Robust Model for Thegrowth of the Nigerian Population
A Robust Model for Thegrowth of the Nigerian Population
 

Similar to Android security analysis of a single sign-on mechanism for distributed computer networks

Security analysis of a single sign on mechanism for distributed computer netw...
Security analysis of a single sign on mechanism for distributed computer netw...Security analysis of a single sign on mechanism for distributed computer netw...
Security analysis of a single sign on mechanism for distributed computer netw...
Ecway Technologies
 
Java security analysis of a single sign-on mechanism for distributed compute...
Java  security analysis of a single sign-on mechanism for distributed compute...Java  security analysis of a single sign-on mechanism for distributed compute...
Java security analysis of a single sign-on mechanism for distributed compute...
ecwayerode
 
Android security analysis of a single sign-on mechanism for distributed comp...
Android  security analysis of a single sign-on mechanism for distributed comp...Android  security analysis of a single sign-on mechanism for distributed comp...
Android security analysis of a single sign-on mechanism for distributed comp...
ecway
 
Java security analysis of a single sign-on mechanism for distributed compute...
Java  security analysis of a single sign-on mechanism for distributed compute...Java  security analysis of a single sign-on mechanism for distributed compute...
Java security analysis of a single sign-on mechanism for distributed compute...
Ecway Technologies
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed Network
IJERA Editor
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
samprada123
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
Ecwayt
 
Dotnet toward a statistical framework for source anonymity in sensor networks
Dotnet  toward a statistical framework for source anonymity in sensor networksDotnet  toward a statistical framework for source anonymity in sensor networks
Dotnet toward a statistical framework for source anonymity in sensor networks
Ecwaytech
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
Ecwaytech
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568
IJRAT
 

Similar to Android security analysis of a single sign-on mechanism for distributed computer networks (20)

Security analysis of a single sign on mechanism for distributed computer netw...
Security analysis of a single sign on mechanism for distributed computer netw...Security analysis of a single sign on mechanism for distributed computer netw...
Security analysis of a single sign on mechanism for distributed computer netw...
 
Java security analysis of a single sign-on mechanism for distributed compute...
Java  security analysis of a single sign-on mechanism for distributed compute...Java  security analysis of a single sign-on mechanism for distributed compute...
Java security analysis of a single sign-on mechanism for distributed compute...
 
Android security analysis of a single sign-on mechanism for distributed comp...
Android  security analysis of a single sign-on mechanism for distributed comp...Android  security analysis of a single sign-on mechanism for distributed comp...
Android security analysis of a single sign-on mechanism for distributed comp...
 
Java security analysis of a single sign-on mechanism for distributed compute...
Java  security analysis of a single sign-on mechanism for distributed compute...Java  security analysis of a single sign-on mechanism for distributed compute...
Java security analysis of a single sign-on mechanism for distributed compute...
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed Network
 
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
 
Physical Layer Essay
Physical Layer EssayPhysical Layer Essay
Physical Layer Essay
 
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROLAPPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
 
J0704055058
J0704055058J0704055058
J0704055058
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 
Dotnet toward a statistical framework for source anonymity in sensor networks
Dotnet  toward a statistical framework for source anonymity in sensor networksDotnet  toward a statistical framework for source anonymity in sensor networks
Dotnet toward a statistical framework for source anonymity in sensor networks
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 
Paper1_Final
Paper1_FinalPaper1_Final
Paper1_Final
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568
 
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
 

Android security analysis of a single sign-on mechanism for distributed computer networks

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS ABSTRACT: In this paper, however, we demonstrative that their scheme is actually insecure as it fails to meet credential privacy and soundness of authentication. Specifically, we present two impersonation attacks. The first attack allows a malicious service provider, who has successfully communicated with a legal user twice, to recover the user’s credential and then to impersonate the user to access resources and services offered by other service providers. In another attack, an outsider without any credential may be able to enjoy network services freely by impersonating any legal user or a nonexistent user. We identify the flaws in their security arguments to explain why attacks are possible against their SSO scheme. Our attacks also apply to another SSO scheme proposed by Hsu and Chuang, which inspired the design of the Chang–Lee scheme. Moreover, by employing an efficient verifiable encryption of RSA signatures proposed by Ateniese, we propose an improvement for repairing the Chang–Lee scheme.