IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDIJNSA Journal
In a distributed system, authentication protocols are the basis of security to ensure that these protocols function properly. Passwords are one of the most common authentication protocol used nowadays. Because of low entropy of passwords makes the systems vulnerable to password guessing attacks. This paper presents a simple scheme that strengthens password-based authentication protocols and helps prevent dictionary attacks, replay attacks and man in the middle attacks etc., The proposed scheme presents a new password authentication protocol by using the user and server system identification/serial number. Here there is no possibility to store the user passwords so an attacker who gets the password cannot use it directly to gain immediate access and compromise security.
A performance comparison of proposed approach of multiserver authentication a...eSAT Journals
Abstract
Use of smart card makes remote user verification and key agreement easy, elastic to making a secure scattered system environment. It is very important to provide user privacy protection in authentication phase. In this paper, we are describing the performance comparison of Jung approach for multiple server authentication and key agreement schemes with user protection in network security with our proposed approach. First we are describing the jaung approach then overview of our approach with comparison. All the areas those can be improved by us are also defined. Our approach is works for single server as well as multi sever environment. According to our analysis the jaung approach is open to the element, leak-of-verifier attack and session key discovery attack and smart card loss attack. We are saving data into the server table in form of digital identity, smart card is removed by us, and so the new approach is safe from smart card loss attack.
Keywords: User Verification, Session Key, Comparison, Key Size, Smart Card, Network Security.
Cryptanalysis and Security Enhancement of a Khan et al.'s Schemeiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Secure3 authentication for sensitive data on cloud using textual, chessboard ...eSAT Journals
Abstract Existing systems of authentication are plagued by many weaknesses. As a high speed cloud infrastructure is being developed and people are informationized, the sensitive data are also engaged in cloud feild. However, the existing cloud sensitive file upload and download on cloud was exposed to the danger of hacking. Recently, the personal information has been leaked by a high degree method such as Phishing or Pharming beyond snatching a user ID and Password. Seeing that most of examples which happened in the file uploading and downloading were caused by the appropriation of ID or Password belonging to others, a safe user confirmation system gets much more essential. In this paper, we propose a new authentication system file uploading and downloading on cloud using HADOOP technique. In HADOOP technique there are 3 technique but we can use HDFS (Hadoop Distributed File System).This authentication system is a combination of a three authentication system i.e. Secure3 in that 1)Textual,2)Chessboard,3)QR-code Authentication. In Textual authentication normal authentication is required to login .i.e username and password. In chessboard authentication user plays a steps of a chessboard and select that steps as authentication. In QR-code used Mobile OTP with the combination of QR-code which is a variant of the 2D barcode. we also include a priority of a sensitive data in that low priority sensitive data have only a Textual authentication system. Medium priority sensitive data have Textual +chessboard authentication system. High priority sensitive data have Textual +chessboard +QR-code authentication system. Keywords: OTP(one Time Password),QR(Quick-Response),CBS(Chess Board System),HDFS (Hadoop Distributed File System),IMEI(International Mobile Center Equipment Identity),AES(Advanced Encryption Standard).
Password authentication with smart card is one of the simplest and efficient authentication mechanisms to ensure secure communication over insecure network environments. Recently, Tsai et al. proposed an improved password authentication scheme for smart card. Their scheme is more secure than the other previous schemes. In this paper, we show Tsai et al.’s scheme is vulnerable to password guessing attack and has computational overhead. Furthermore, we propose an enhanced password authentication scheme to eliminate the security vulnerability and enhance the overhead. By presenting concrete analysis of security and performance, we show that the proposed scheme cannot only resist various well known attacks, but also is more efficient than the other related works, and thus is feasible for practical applications.
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDIJNSA Journal
In a distributed system, authentication protocols are the basis of security to ensure that these protocols function properly. Passwords are one of the most common authentication protocol used nowadays. Because of low entropy of passwords makes the systems vulnerable to password guessing attacks. This paper presents a simple scheme that strengthens password-based authentication protocols and helps prevent dictionary attacks, replay attacks and man in the middle attacks etc., The proposed scheme presents a new password authentication protocol by using the user and server system identification/serial number. Here there is no possibility to store the user passwords so an attacker who gets the password cannot use it directly to gain immediate access and compromise security.
A performance comparison of proposed approach of multiserver authentication a...eSAT Journals
Abstract
Use of smart card makes remote user verification and key agreement easy, elastic to making a secure scattered system environment. It is very important to provide user privacy protection in authentication phase. In this paper, we are describing the performance comparison of Jung approach for multiple server authentication and key agreement schemes with user protection in network security with our proposed approach. First we are describing the jaung approach then overview of our approach with comparison. All the areas those can be improved by us are also defined. Our approach is works for single server as well as multi sever environment. According to our analysis the jaung approach is open to the element, leak-of-verifier attack and session key discovery attack and smart card loss attack. We are saving data into the server table in form of digital identity, smart card is removed by us, and so the new approach is safe from smart card loss attack.
Keywords: User Verification, Session Key, Comparison, Key Size, Smart Card, Network Security.
Cryptanalysis and Security Enhancement of a Khan et al.'s Schemeiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Secure3 authentication for sensitive data on cloud using textual, chessboard ...eSAT Journals
Abstract Existing systems of authentication are plagued by many weaknesses. As a high speed cloud infrastructure is being developed and people are informationized, the sensitive data are also engaged in cloud feild. However, the existing cloud sensitive file upload and download on cloud was exposed to the danger of hacking. Recently, the personal information has been leaked by a high degree method such as Phishing or Pharming beyond snatching a user ID and Password. Seeing that most of examples which happened in the file uploading and downloading were caused by the appropriation of ID or Password belonging to others, a safe user confirmation system gets much more essential. In this paper, we propose a new authentication system file uploading and downloading on cloud using HADOOP technique. In HADOOP technique there are 3 technique but we can use HDFS (Hadoop Distributed File System).This authentication system is a combination of a three authentication system i.e. Secure3 in that 1)Textual,2)Chessboard,3)QR-code Authentication. In Textual authentication normal authentication is required to login .i.e username and password. In chessboard authentication user plays a steps of a chessboard and select that steps as authentication. In QR-code used Mobile OTP with the combination of QR-code which is a variant of the 2D barcode. we also include a priority of a sensitive data in that low priority sensitive data have only a Textual authentication system. Medium priority sensitive data have Textual +chessboard authentication system. High priority sensitive data have Textual +chessboard +QR-code authentication system. Keywords: OTP(one Time Password),QR(Quick-Response),CBS(Chess Board System),HDFS (Hadoop Distributed File System),IMEI(International Mobile Center Equipment Identity),AES(Advanced Encryption Standard).
Password authentication with smart card is one of the simplest and efficient authentication mechanisms to ensure secure communication over insecure network environments. Recently, Tsai et al. proposed an improved password authentication scheme for smart card. Their scheme is more secure than the other previous schemes. In this paper, we show Tsai et al.’s scheme is vulnerable to password guessing attack and has computational overhead. Furthermore, we propose an enhanced password authentication scheme to eliminate the security vulnerability and enhance the overhead. By presenting concrete analysis of security and performance, we show that the proposed scheme cannot only resist various well known attacks, but also is more efficient than the other related works, and thus is feasible for practical applications.
Portability increases the probability for a wireless device to be stolen or lost. These devices usually carry sensitive business or private information. Government Employees store classified documents on their mobile devices. Corporate users save confidential files, PINs, Passwords on their devices. So the content of such devices should be protected from unauthorized access. However, the protection provided should not be heavy for a mobile phone because it would minimize the computing power, storage space, battery lifetime. To prevent this from happening, we are providing an algorithm which would ensure data privacy for the end users. ASCII values of plain text will
be used to generate a secret key and same key would be used for decryption. It can be said to be a symmetric encryption algorithm because same key is used to encrypt and decrypt the data. A Secret key will be randomly generated from the ASCII values of plain text which when encrypted with the plain text will provide a cipher text which will be sent back to the Application with the key. For Decryption, cipher text and key will be fetched from Application and decryption process will occur at server. By this method this application will not be heavy for a
mobile phone and this would be an efficient method for data security.
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...IJCNCJournal
In this paper, we consider the problem of calculating the node reputation in a Peer-toPeer (P2P) system from fragments of partial knowledge concerned with the trustfulness of nodes which are subjectively given by each node (i.e., evaluator) participating in the system. We are particularly interested in the distributed processing of the calculation of reputation scores while preserving the privacy of evaluators. The basic idea of the proposed method is to extend the EigenTrust reputation management system with the notion of homomorphic cryptosystem. More specifically, it calculates the main eigenvector of a linear system which models the trustfulness of the users (nodes) in the P2P system in a distributed manner, in such a way that: 1) it blocks accesses to the trust value by the nodes to have the secret key used for the decryption, 2) it improves the efficiency of calculation by offloading a part of the task to the participating nodes, and 3) it uses different public keys during the calculation to improve the robustness against the leave of nodes. The performance of the proposed method is evaluated through numerical calculations.
Improving the Secure Socket Layer by Modifying the RSA AlgorithmIJCSEA Journal
Secure Socket Layer (SSL) is a cryptographic protocol which has been used broadly for making secure connection to a web server. SSL relies upon the use of dependent cryptographic functions to perform a secure connection. The first function is the authentication function which facilitates the client to identify the server and vice versa [1]. There have been used, several other functions such as encryption and integrity for the imbuement of security. The most common cryptographic algorithm used for ensuring security is RSA. It still has got several security breaches that need to be dealt with. An improvement over this has been implemented in this paper. In this paper, a modification of RSA has been proposed that switches from the domain of integers to the domain of bit stuffing to be applied to the first function of SSL that would give more secure communication. The introduction of bit stuffing will complicate the access to the message even after getting the access to the private key. So, it will enhance the security which is the inevitable requirement for the design of cryptographic protocols for secure communication.
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONSIJNSA Journal
Group communication implies a many-to-many communication and it goes beyond both one-to-one
communication (i.e., unicast) and one-to-many communication (i.e., multicast). Unlike most user
authentication protocols that authenticate a single user each time, we propose a new type of authentication,
called group authentication, that authenticates all users in a group at once. The group authentication
protocol is specially designed to support group communications. There is a group manager who is
responsible to manage the group communication. During registration, each user of a group obtains an
unique token from the group manager. Users present their tokens to determine whether they all belong to
the same group or not. The group authentication protocol allows users to reuse their tokens without
compromising the security of tokens. In addition, the group authentication can protect the identity of each
user.
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...IJNSA Journal
Recently, Li et al. proposed a secure biometric-based remote user authentication scheme using smart cards to withstand the security flaws of Li-Hwang’s efficient biometric-based remote user authentication scheme using smart cards. Li et al.’s scheme is based on biometrics verification, smart card and one-way hash function, and it also uses the random nonce rather than a synchronized clock, and thus it is efficient in computational cost and more secure than Li-Hwang’s scheme. Unfortunately, in this paper we show that Li et al.’s scheme still has some security weaknesses in their design. In order to withstand those weaknesses in their scheme, we further propose an improvement of their scheme so that the improved scheme always provides proper authentication and as a result, it establishes a session key between the user and the server at the end of successful user authentication.
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUT...IJNSA Journal
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which has many advantage such as no verifier table, user freedom to choose and change password and so on. However the subsequent papers have shown that this scheme is completely insecure and vulnerable to many attacks. Since then many schemes with improvements to Das et al’s scheme has been proposed but each has its pros and cons. Recently Yan-yan Wang et al. have proposed a scheme to overcome security weaknesses of Das et al.’s scheme. However this scheme too is vulnerable to various security attacks such as password guessing attack, masquerading attack, denial of service attack.
Security issues have become a major issue in recent years due to the advancement of technology in networking and its use in a destructive way. A number of Defence strategies have been devised to overcome the flooding attack which is prominent in the networking industry due to which depletion of resources Takes place. But these mechanism are not designed in an optimally and effectively and some of the issues have been unresolved. Hence in this paper we suggest a Game theory based strategy to create a series of Defence mechanisms using puzzles. Here the concept of Nash equilibrium is used to handle sophisticated flooding attack to defend distributed attacks from unknown number of sources
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)IJERA Editor
Websites such as email providers use Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA) which is a simple test easily solved by humans but not by computers and hence provides a way of distinguishing a legitimate human user from an attacker. Methods have been developed like the Optical Character Recognition (OCR) and the third party human attack which have made CAPTCHAs vulnerable. The third party human attack poses a real threat to the use of CAPTCHA which can be easily shown using the Instant Messenger CAPTCHA Attack (IMCA). A new defense system, the interactive CAPTCHA (iCAPTCHA) was developed to defend against third party human solver attacks. The iCAPTCHA is solved via user interactions and the back-and-forth traffic between the client and server amplifies the statistical timing difference between a third party human attacker and a legitimate human user. The aim of this research is to use iCAPTCHA in Smartphones which will be solved after a certain number of password trials. However iCAPTCHA alone cannot provide sufficient security, therefore to further provide security, the iCAPTCHA will be encrypted using RSA and Elliptic Curve Cryptography.
Semantic approach utilizing data mining and case based reasoning for it suppo...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Discovering adaptive wireless sensor network using β synchronizereSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Characterization of reusable software components for better reuseeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Portability increases the probability for a wireless device to be stolen or lost. These devices usually carry sensitive business or private information. Government Employees store classified documents on their mobile devices. Corporate users save confidential files, PINs, Passwords on their devices. So the content of such devices should be protected from unauthorized access. However, the protection provided should not be heavy for a mobile phone because it would minimize the computing power, storage space, battery lifetime. To prevent this from happening, we are providing an algorithm which would ensure data privacy for the end users. ASCII values of plain text will
be used to generate a secret key and same key would be used for decryption. It can be said to be a symmetric encryption algorithm because same key is used to encrypt and decrypt the data. A Secret key will be randomly generated from the ASCII values of plain text which when encrypted with the plain text will provide a cipher text which will be sent back to the Application with the key. For Decryption, cipher text and key will be fetched from Application and decryption process will occur at server. By this method this application will not be heavy for a
mobile phone and this would be an efficient method for data security.
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...IJCNCJournal
In this paper, we consider the problem of calculating the node reputation in a Peer-toPeer (P2P) system from fragments of partial knowledge concerned with the trustfulness of nodes which are subjectively given by each node (i.e., evaluator) participating in the system. We are particularly interested in the distributed processing of the calculation of reputation scores while preserving the privacy of evaluators. The basic idea of the proposed method is to extend the EigenTrust reputation management system with the notion of homomorphic cryptosystem. More specifically, it calculates the main eigenvector of a linear system which models the trustfulness of the users (nodes) in the P2P system in a distributed manner, in such a way that: 1) it blocks accesses to the trust value by the nodes to have the secret key used for the decryption, 2) it improves the efficiency of calculation by offloading a part of the task to the participating nodes, and 3) it uses different public keys during the calculation to improve the robustness against the leave of nodes. The performance of the proposed method is evaluated through numerical calculations.
Improving the Secure Socket Layer by Modifying the RSA AlgorithmIJCSEA Journal
Secure Socket Layer (SSL) is a cryptographic protocol which has been used broadly for making secure connection to a web server. SSL relies upon the use of dependent cryptographic functions to perform a secure connection. The first function is the authentication function which facilitates the client to identify the server and vice versa [1]. There have been used, several other functions such as encryption and integrity for the imbuement of security. The most common cryptographic algorithm used for ensuring security is RSA. It still has got several security breaches that need to be dealt with. An improvement over this has been implemented in this paper. In this paper, a modification of RSA has been proposed that switches from the domain of integers to the domain of bit stuffing to be applied to the first function of SSL that would give more secure communication. The introduction of bit stuffing will complicate the access to the message even after getting the access to the private key. So, it will enhance the security which is the inevitable requirement for the design of cryptographic protocols for secure communication.
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONSIJNSA Journal
Group communication implies a many-to-many communication and it goes beyond both one-to-one
communication (i.e., unicast) and one-to-many communication (i.e., multicast). Unlike most user
authentication protocols that authenticate a single user each time, we propose a new type of authentication,
called group authentication, that authenticates all users in a group at once. The group authentication
protocol is specially designed to support group communications. There is a group manager who is
responsible to manage the group communication. During registration, each user of a group obtains an
unique token from the group manager. Users present their tokens to determine whether they all belong to
the same group or not. The group authentication protocol allows users to reuse their tokens without
compromising the security of tokens. In addition, the group authentication can protect the identity of each
user.
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...IJNSA Journal
Recently, Li et al. proposed a secure biometric-based remote user authentication scheme using smart cards to withstand the security flaws of Li-Hwang’s efficient biometric-based remote user authentication scheme using smart cards. Li et al.’s scheme is based on biometrics verification, smart card and one-way hash function, and it also uses the random nonce rather than a synchronized clock, and thus it is efficient in computational cost and more secure than Li-Hwang’s scheme. Unfortunately, in this paper we show that Li et al.’s scheme still has some security weaknesses in their design. In order to withstand those weaknesses in their scheme, we further propose an improvement of their scheme so that the improved scheme always provides proper authentication and as a result, it establishes a session key between the user and the server at the end of successful user authentication.
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUT...IJNSA Journal
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which has many advantage such as no verifier table, user freedom to choose and change password and so on. However the subsequent papers have shown that this scheme is completely insecure and vulnerable to many attacks. Since then many schemes with improvements to Das et al’s scheme has been proposed but each has its pros and cons. Recently Yan-yan Wang et al. have proposed a scheme to overcome security weaknesses of Das et al.’s scheme. However this scheme too is vulnerable to various security attacks such as password guessing attack, masquerading attack, denial of service attack.
Security issues have become a major issue in recent years due to the advancement of technology in networking and its use in a destructive way. A number of Defence strategies have been devised to overcome the flooding attack which is prominent in the networking industry due to which depletion of resources Takes place. But these mechanism are not designed in an optimally and effectively and some of the issues have been unresolved. Hence in this paper we suggest a Game theory based strategy to create a series of Defence mechanisms using puzzles. Here the concept of Nash equilibrium is used to handle sophisticated flooding attack to defend distributed attacks from unknown number of sources
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)IJERA Editor
Websites such as email providers use Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA) which is a simple test easily solved by humans but not by computers and hence provides a way of distinguishing a legitimate human user from an attacker. Methods have been developed like the Optical Character Recognition (OCR) and the third party human attack which have made CAPTCHAs vulnerable. The third party human attack poses a real threat to the use of CAPTCHA which can be easily shown using the Instant Messenger CAPTCHA Attack (IMCA). A new defense system, the interactive CAPTCHA (iCAPTCHA) was developed to defend against third party human solver attacks. The iCAPTCHA is solved via user interactions and the back-and-forth traffic between the client and server amplifies the statistical timing difference between a third party human attacker and a legitimate human user. The aim of this research is to use iCAPTCHA in Smartphones which will be solved after a certain number of password trials. However iCAPTCHA alone cannot provide sufficient security, therefore to further provide security, the iCAPTCHA will be encrypted using RSA and Elliptic Curve Cryptography.
Semantic approach utilizing data mining and case based reasoning for it suppo...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Discovering adaptive wireless sensor network using β synchronizereSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Characterization of reusable software components for better reuseeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
New optimization scheme for cooperative spectrum sensing taking different snr...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Emotional telugu speech signals classification based on k nn classifiereSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Performance analysis of al fec raptor code over 3 gpp embms networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Experimental investigation of stepped aerofoil using propeller test rigeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Efficient and Secure Single Sign on Mechanism for Distributed NetworkIJERA Editor
Distributed network act as core part to access the various services which are available in the network. But the security related to distributed network is main concern. In this paper single sign-on SSO mechanism is introduced which gives access to all services by allowing to sign on only once by users. In this mechanism once user logs in to the Trusted Authority Center TAC then application or services which are register to trusted center will automatically verifies the user’s credentials details and these credentials like password or digital signature will be only one for all applications or services. Unlike all other previous mechanisms where in, if user wants to have access multiple services then for every service distinct user credentials (username, password) must be required. SSO act as single authentication window to user for admittance multiple service providers in networks. Previously introduced technique based SSO technology proved to be secure over well-designed SSO system, but fails to provide security during communication. So here emphasis is given on authentication as open problem and on to refining the already proposed SSO process. And to do this along with RSA algorithm which was used in previous SSO process, we will be using MAC algorithm, which is intended to provide secured pathway for communication over distributed network.TAC i.e. Trusted Authority Center is used for sending token integrated with private and shared public key to user.
Advanced mechanism for single sign on for distributed computer networkseSAT Journals
Abstract A distributed computer networks could be a special form of the network that facilitates the purchasers to use completely different network services that is provided by the service suppliers. Within the distributed computer networks, user verification is a crucial method for the protection. Within the verification, the choice is taken whether the user is legal or not and then enabled the users to access the service. In general users are using multiple usernames and passwords for to access different applications on a distributed computer network. This increase the burden of the user and organization administrator as each and every account of the organization is going to be handled with their explicit username and credential. A new certification plan that is named as single sign-on mechanism that facilitates the users with one identity token to be verified by multiple service suppliers. Single sign-on is one of user authentication method that allows a user to enter one name and identity token so as to access multiple applications. The method authenticates the user for all the applications they have been offered access to and eliminates additional prompts after they switch applications throughout a specific session. However, existing approaches which are utilizing single sign-on scheme have some drawbacks relating to security needs. Thus, through this paper, we will discuss regarding the event of security from earlier stage to present stage. And clearly discuss regarding the authentication steps between user and service supplier. Keywords — single sign-on, authentication token , mutual authentication
Cross cloud single sign on (sso) using tokenseSAT Journals
Abstract
The cloud computing service provider ensures the security of their services by username/password schemes. Such type of scheme may be suitable for small personalized services but not for the large scale organizations where employees may require to login for more than one application related to various clouds. This paper identifies the issues of multiple logins and presents how multiple applications of various clouds are accessed by single login process securely. Single Sign-On is the mechanism where a user only need to authenticate him/her self once, then has the ability to access other protected resources without having to re-authenticate. Our objective is to design the single sign on architecture for more than one cloud’s applications. Due to that client log in only one time at time and automatically user login in remaining cloud applications and assess successful same process is for log out only user logout once then user logout properly from the all of the cloud applications. The login audits are done for the security purpose and its controlling by admin panel. Cloud service providers also neither need to support redundant registration process for new accounts of applications nor dealing with enormous databases for same user of multiple applications and managing multiple authentication credentials is annoying for users and as well as for authentication system. In other words, Single sign-on (SSO) is the mechanism whereby a single action of user authentication and authorization can permit a user to access all computers and systems where that user has access permission, without the need to enter multiple passwords.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
JAVA 2013 IEEE NETWORKSECURITY PROJECT Security analysis of a single sign on ...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Security analysis of a single sign on mechanism for distributed computer netw...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Empirical Study of a Key Authentication Scheme in Public Key CryptographyIJERA Editor
Public key cryptosystem plays major role in many online business applications. In public key cryptosystem, public key need not be protected for confidentiality, but the authenticity of public key is needed. Earlier, many key authentication schemes are developed based on discrete logarithms. Each scheme has its own drawbacks. We developed a secure key authentication scheme based on discrete logarithms to avoid the drawbacks of earlier schemes. In this paper, we illustrate the empirical study to show the experimental proof of our scheme.
A performance comparison of proposed approach of multiserver authentication a...eSAT Journals
Abstract
Use of smart card makes remote user verification and key agreement easy, elastic to making a secure scattered system environment. It is very important to provide user privacy protection in authentication phase. In this paper, we are describing the performance comparison of Jung approach for multiple server authentication and key agreement schemes with user protection in network security with our proposed approach. First we are describing the jaung approach then overview of our approach with comparison. All the areas those can be improved by us are also defined. Our approach is works for single server as well as multi sever environment. According to our analysis the jaung approach is open to the element, leak-of-verifier attack and session key discovery attack and smart card loss attack. We are saving data into the server table in form of digital identity, smart card is removed by us, and so the new approach is safe from smart card loss attack.
Keywords: User Verification, Session Key, Comparison, Key Size, Smart Card, Network Security.
Anonymity based privacy-preserving dataKamal Spring
In this paper, we propose an efficient anonymous data reporting protocol for participatory sensing, which provides strong privacy protection, data accuracy and generality. The protocol consists of two stages, namely slot reservation and message submission. In the slot reservation stage, a group of N participants cooperate to assign each member a message slot in a vector which is essentially a message submission schedule, in such a manner that each participant’s slot is oblivious to other members and the application server. In the message submission stage, each participant transmits an encoded data to the application server based on the slot information known only to herself, in such a way that the application server cannot link a data to a specific participant. With such a data reporting protocol, the link between the data and the participants is broken, and as a result, participant’s privacy is protected. We conduct theoretical analysis of the correctness and anonymity of our protocol, as well as experiments to demonstrate the efficiency in small-scale applications with periodic data sampling
- Security is a concept similar to being cautious
or alert against any danger. Network security is the condition of
being protected against any danger or loss. Thus safety plays a
important role in bank transactions where disclosure of any data
results in big loss. We can define networking as the combination
of two or more computers for the purpose of resource sharing.
Resources here include files, database, emails etc. It is the
protection of these resources from unauthorized users that
brought the development of network security. It is a measure
incorporated to protect data during their transmission and also
to ensure the transmitted is protected and authentic.
Security of online bank transactions here has been
improved by increasing the number of bits while establishing the
SSL connection as well as in RSA asymmetric key encryption
along with SHA1 used for digital signature to authenticate the
user
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A novel graphical password approach for accessing cloud & data verificationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Augmenting Publish/Subscribe System by Identity Based Encryption (IBE) Techni...IJCERT JOURNAL
Security is one of the extensive and complicated requirements that need to be provided in order to achieve few issues like confidentiality, integrity and authentication. In a content-based publish/subscribe system, authentication is difficult to achieve since there exists no strong bonding between the end parties. Similarly, Integrity and confidentiality needs arise in published events and subscription conflicts with content-based routing. The basic tool to support confidentiality, integrity is encryption. In this paper for providing security mechanism in broker-less content-based publish/subscribe system we adapt pairing-based cryptography mechanism. In this mechanism, we use Identity Based Encryption (IBE) technique to achieve the needs of publish/subscribe system. This approach helps in providing fine-grained key management, effective encryption, decryption operations and routing is carried out in the order of subscribed attributes
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networksrahulmonikasharma
If a user wants to connect to a server has to provide his credentials where as some of the user (avoids to enter their original credentials) connect through anonymizing network such tor browser. Internet services can be accessed privately through anonymizing networks like Tor. A set of routers are used to achieve this in order to hide the identity of client from server. The advent of anonymizing networks assured that users could access internet services with complete privacy avoiding any possible hindrance. IP was being shown everywhere, To advertisers and other places, even from SPAM who compromised users identity. Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. In order to allow users to access Internet services privately, anonymizing networks like Tor uses a series of routers to hide the client’s IP address from the server. Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server.
Similar to Adapting singlet login in distributed systems (20)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Water Industry Process Automation and Control Monthly - May 2024.pdf
Adapting singlet login in distributed systems
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 523
ADAPTING SINGLET LOGIN IN DISTRIBUTED SYSTEMS
Bhavana M. Bahikar1
, Praveen R. Barapatre2
1
Department of computer engineering SKN-SITS, Lonavala
2
Asst. Prof., Department of Information Technology SKN-SITS, Lonavala
Abstract
In a distributed system, there are numerous service provider. The user must be authenticated to entrance the services provided by the
service provider. It is challenging to recall all secret words for users. So to clarify this problem single sign on is used which is an
authentication contrivance in that permit a single license to be validated by multiple service provider. The Wang, Yu, and Qi Xie find
that Chang – Lee Scheme undergoes from two attacks one of which is that the aggressor is outside service provider converses with the
authenticated user twice and get the license necessary to right to use data in distributed systems. The second attack is the outsider
easily receiving right to use to, use services without any license by mimicking authenticate user. This violence also associated with
Hsu and Chang Scheme. To sidestep these attacks Wang, Yu, and Qi Xie employed RSA-VES. For enhancement and soundness of
authentication, this paper services One Time Password to Wang, Yu, and Qi Xie Method. Now a days OTP plays important role in an
authentication, so that using OTP for secure single sign on its easy to provide soundness for authentication.
Keywords— Authentication, RSA-VES, distributed system, Security, Single Sign On(SSO),One Time Password(OTP).
---------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
In computer network, interchange information firmly
between two users is a challenging task because there are
probabilities that fraud users or service provider may enter into
the system to use services without any license. To exchange
information securely authentication is required. Authentication
is the vital activity in the distributed system and fair exchange
between two user and service provider. After mutual
authentication, the next step is that we have to generate a
session key for the privacy of data exchange by two users and
also the service provider so that data can be sent on unsecure
channel securely. It is difficult to design authentication because
there are many chances of fraud users or service providers can
generate duplicate license to right to use data in a distributed
system.
In a distributed system, there are a number of service providers
so that to right to use those service users must have
authentication. And it is difficult for users to remember those
secret words and also these increased overhead for the system.
So that to reduce overhead as well as to reduce human efforts to
remember all those secret words, there is an authentication
mechanism called as SSO, SSO scheme allows single identity
and secret word to right to use multiple services in the
distributed system no need to create different identity and secret
word for each service provider so that it reduces the overhead.
There are three necessary requirements for SSO authentication,
which require to be fulfill as unforgeability which means that
user and service provider cannot forge a license for new user
the right to forge new user is provided to only trusted authority.
The another requirement is that license privacy means that
unapproved users cannot recover all the license and mimic user
to write to use services from different service provider by
communicating with the approved user, and the last but not the
least requirement is soundness it deals with only approved user
able to write to use services provided by service provider it
means an unapproved user cannot right to use services without
any license [14]. These requirements indicate that SSO can
work with the uniqueness and secret word, there is no need to
keep different secret words for different service provider means
using a single identity a user can right to use all approved
services in the distributed system.
To converse on a distributed system securely there is need of
authentication that means users interacting are the intended user
and also service provider is also authenticated that it should not
be a fraud service provider then only we can establish a secure
connection to share secret information in insecure channel.
There is need of a third party, we can say that trusted party
which has authority to provide licenses to the users and service
providers so that when we want to converse we can verify that
users and service provider are approved or not. It helps to find
fraud users or service providers because the only main party has
the power to add new user or new service provider.
The Chang –Lee scheme uses the secure SSO mechanism and
they applied the RSA algorithm to fair exchange of data, but
these schemes are suffering from the certificate recovering
attack that is when any unapproved service provider can
converse with the approved user without any license twice or
more than that then the service provider is able to recover a
license. After getting authority to an unapproved service
provider can forge a number of unapproved users. The second
attack is an impersonation attack without any certificate, it
indicates that any unapproved user without any license can be
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 524
able to right to use the services provided by service provider
this attack is applicable to Chang –Lee which is proven by
Wang, Yu, and Qi Xie and they employed efficient verifiable
encryption RSA signature to improve Change- Lee Scheme in
soundness and certificate privacy. The Hsu and Chang scheme
are also suffering from the certificate recovering attack and
impersonation attack without any certificate. In this paper
proposed that adding One Time Password to Wang, Yu, and Qi
Xie so that it can provide soundness for authentication.
A one-time password (OTP) is the one in which secret word is
valid for only for one login session if we want to login again we
need new OTP. OTP is better than (static) secret words and
there is no necessity to recall the secret word every time or
create a new secret word for different service again and again.
OTP is not vulnerable to replay attack because we cannot use
the same secret word for new login so if anyone try to use the
same secret word then session rejected. No one misuses OTP
because it varies for each login it never valid for long duration.
OTPs are very hard to learn by heart for human beings. One
Time Password generation algorithms typically make use of
uncertainty that is OTP is generated randomly there is no need
of physical interaction. This is helpful otherwise anyone
guesses future OTPs by noticing previous OTPs and can get
right to use for the session. Different methods for the
generation of OTPs are given as:
• By using time-synchronization in-between the service
provider and the users providing the secret word (it is
valid only for a short period of time)
• By using a mathematical algorithm to create a new
secret word which can be done by using previous
secret words (These are effectively a chain and must
be used in a predefined order).
• By using a mathematical algorithm where the new
secret word is generated by a challenge (e.g., A
random number chosen by the service provider) and/or
using a counter.
The RSA algorithm is used for secure message between users.
RSA algorithm deals with key generation, encryption and
decryption are given as-
1. Choose two prime numbers p and q. For security
purposes, the p and q should be chosen at random, and
should be of similar bit-length.
2. n = pq.
n is used as the modulus for both the public and
private keys. Its length, usually expressed in bits, is
the key length.
3. Compute φ (n) = φ (p) x φ (q) = (p − 1) (q − 1), where
φ is Euler's quotient function.
4. Select an integer e such that 1 < e < φ(n) and ed
= 1 mod φ(n) is released as the public key exponent.
5. Find d as d−1
≡ e (mod φ(n)), i.e., d is
the multiplicative inverse of e (modulo φ(n)).
d is kept as the private key exponent.
Plain Text (PT)
Cipher Text (CT)
6. CT=(PT)e
mod n
7. PT=(CT)d
mod n
1.1 Notations Table
SR.
No.
Notation Meaning
1 SCPC Smart Card Producing Center, which is
a trusted authority
2 Ui, Pj User provider and Service provider
3 IDu, IDp Identity of user and service provider
4 ei, di Public/private key pair of RSA
encryption, decryption algorithm of
identity i.
5 Si User (Ui) certificate, provide by SCPC
6 Sx Long term private key of SCPC
7 Sy Public key of SCPC
8 EK(P) A symmetric key encryption of plain
text P using key K
9 DK(C) A symmetric key decryption of cipher
text C using key K
10 σj(SKj,P) The signature σj on P signed by Pj with
signing key SKj
11 Ver(PKj,P,σj) Verifying signature σj on P with public
key PKj
12 h(·) Used for One way Hash function
13 || Used for concatenation
2. LITERATURE SURVEY
In 2000, Lee and Chang [3] proposed a user identification
scheme and also key distribution conserving user obscurity in
distributed systems, for authentication it is necessary to identify
users who are capable to right to use the services provided by a
service provider, and, Lee and Chang are one who take steps just
before user identification. The factoring problem and one way
hash function is based of Security of the scheme. The service
providers can only the one who acknowledged the approved user
and able to establish a session key with, approved user, these all
things is handled by the security scheme. One more thing that
scheme does not need to create secret word table. Afterward, in
2004, Wu and Hsu [6] find that the Lee–Chang’s scheme is
affected by a masquerade attack which deal with the banned user
has assumed legal user identity and can right to use data which
is that legal user is approved. In masquerade service provider
can be masqueraded to interchange a session key with a user so
unapproved service provider can take authorization so it will
easily add the unapproved users in the system. Wu and Hsu
make changes in Change- Lee scheme that is refining efficient
user identification scheme and also key distribution. In 2004,
Yang et al. [7] Prove that Wu-Hsu’s scheme has some drawback
so Yang et al. Make improvement in the Wu – Hsu scheme by
adding more security requirement.
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 525
Later, in 2006 Mangipudi and Katti [8] have find out that Yang
et al.’s scheme is affected by a denial of service attack in which
unapproved user can continuously send packet to the server so
that server will blocked and approved user cannot able to right to
use the services provided by the service provider. To improve
such a DoS attack, Mangipudi and Katti further proposed a
secure identification and key agreement protocol with user
anonymity (SIKA). In 2009 Hsu and Chuang [9] find that both
Yang et al.’s and Mangipudi–Katti’s scheme can be affected by
identity disclosure attack any outsider user can easily crack the
identity of the approved user and proposed an improvement in
Yang et al.’s and Mangipudi–Katti’s scheme. In 2012 Chang –
Lee [13], proposed secure single sign-on mechanism using RSA,
which allow mobile users to use the single identity and secret
word to right to use multiple services in the distributed system.
There is no need to create different identity and secret word for
every service provider with one identity and secret word can
right to use to multiple services called as SSO.
In 2013 Wang, Yu, and Qi Xie [15] find drawback in Change-
Lee Scheme that it is affected by certificate recovering attacks
and impersonation attack without certificate also they improve it
by adding soundness and certificate privacy.
2.1 Review of Wang, YU, and QI XIE Scheme
To improve the Chang-Lee scheme Wang [13], Yu, and Qi Xie
[15] design an RSA-based verifiable encryption of signatures
(RSA-VES), which is used to secure exchange of RSA
signatures and provide soundness and certificate privacy. The
working of VES includes three parameters a SCPC and two
users we can say u1 and u2. When u1 want to send message to
u2 it first encrypt message with SCPC’s public key and send
message to u2. Then u2 again directs the same message back to
u1, so u2 send same message to m2 this for protected
communication. Then u2 gets u1 key from SCPC or u1 itself.
This process is for secure communication. The algorithm is
given as:
2.1.1 Initialization Phase
SCPC (Smart Card Producing Centre) selects two large safe
primes p and q to set N = p X q.
Then, there are two primes pꞌ and qꞌ such that p = 2pꞌ + 1 and q =
2qꞌ + 1. SCPC has two sets its RSA public/private key pair (e, d)
such that e X d = 1 mod 2pꞌqꞌ, where e is a prime use for
encryption and decryption. Let QN be the subgroup of squares in
Ƶ*N whose order #G = pꞌqꞌ is unknown to public but its bit
length lG = |N| - 2 is publically known. SCPC randomly choose
generator g of QN, choose an ElGamal decryption key u, and
calculate the equivalent public key y = gu mod N. To do the
Diffie-Hellman key give-and-take SCPC selects generator ḡ ϵ Ƶ*
N, where n is a new large prime number. SCPC also select a
cryptographic hash function h(·) : {0,1}K , where security
parameter ϵ >1 is chosen to control the tightness of the ZK
proof. Finally, SCPC publishes (e, N, h(·), ϵ, g, y, ḡ, n), and
keeps (d, u) secret.
2.1.2 Registration Phase:
In registration, after receiving a request, SCPC provide Ui fixed-
length unique identity IDi also issues certificate Si = h(IDi)2d
mod N . SCPC’s RSA signature on h(IDi)2 is a method to
compute Si, which is an element of QN, which will be the main
thing we computed.
In Chang –lee Scheme, for every service provider, Pj whose
identity IDj has to preserve a pair of signing keys which is
required for a secure signature scheme (not necessarily RSA).
σj(SKj, P) indicate that the signature σj on plain text signed by
Pj using signing key SKj. Ver(PKj, P,σj) indicate that verifying
of signature σj with public key PKj, gives outputs as “1” or “0”
to understand that signature is valid or not.
2.1.3 Authentication Phase
In authentication phase, using RSA-VES, we authenticate the
user and for service provider uses signature for authentication. In
detail it is given as,
I. User Ui request to the service provider Pj with nonce
n1.
II. After getting request (Req,n1) to service provider Pj, Pj
has to calculate the session key Z=gk
mod n where k is
a random number and K ϵ Ƶ, sets u = Z || IDj || n, then
send message m2 to user as m2 = (Z, v, n2) where n2 is
nonce2 set by service provider Pj, after issuing
signature v = σj(SKj, u).
III. Here Ui get the message m2 from Pj, and sets u
= Z || IDj || n. Ui stop communication if Ver(PKj,
u ,v) = 0 cause signature is invalid. In other case
Ver(PKj, u ,v) ≠ 0 Ui accept the request, then Ui select
random number t ϵ Ƶ* n and compute w = gt
mod n, kij = Zt
mod n, Kij = h(Idj || kij) which is a
session key. The user authentication process is that
user encrypt message(certificate) Si that is P1= si.yr
mod N, p2 = gr
mod N, where r is with binary length lG
and r is any random integer number. Then Ui calculate
a = (ye
)r1
mod N and b = gr1
mod N where a & b are the
commitments, in that r1 is random integer given as r1 ϵ
±{0,1} ϵ (lG+k)
. Later on Ui calculate the evidence by
proving that Si (certificate) is encrypted (P1,P2) with
public key y. For that Ui compute c = h(Kij || w || n2 ||
yer
|| P2 || ye
|| g || a || b ) ,
S = r1 – c.r(in Ƶ). After that, user authentication proof
for NIZK is x= (P1, P2, a, b, c, s). At last Ui send
encrypted message to Pj as m3 = (w, x, CT) where CT
= EKij (IDi || n3 || n2) where n3 is new nonce with user
identity and n2 is Pj’s nonce with key.
IV. For verification process compute kij = wk
mod n, from
these we can calculate session key as Kij = (IDj || kij),
after that using this session key to decrypt CT we can
recover PT as (IDi, n3, n2). Also the Pj calculate yer
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 526
= P1
e
/ h(IDi)2
mod N, a= (ye
)s
. (yer
)c
mod N, b = gs
.
P2
c
mod N, then verify that if (c,s) ϵ {0,1}k
X ± {0,1} ϵ
(lG+k) +1
, c = h(Kij || w || n2 || yer
|| P2 || ye
|| g || a || b ) is
satisfied or not, if result is non- negative indicate that
Pi and Ui shared same session key Kij so confirm
request sending message to Ui as m4= (V) here V =
h(n3), otherwise communication stop if value is
negative.
V. Ui receives m4 from Pj then Ui verify message if he
found that it is right message means that they shared
same session key Kij otherwise Ui stop
communication.
3. PROPOSED SYSTEM
As Wang, Yu, and Qi Xie [15] work on soundness and
certificate privacy of SSO requirement, but still the scheme
required reliability for validation to secure SSO. So for this
paper proposed work is to provide authentication reliability to
make a secure SSO strong which is possible using One Time
Password.
Validation is the first step for a secure communication so it is
necessary to provide strong validation, so that unapproved user
cannot rip-off the certificate from approved user and can able to
right to use the services. To provide strong authentication One
Time Password is helpful cause it never generate same secret
word and secret word is sent to the approved user so that illegal
user cannot right to use data. There is a different method of One
Time Password this paper uses timestamp method that is used
counter, which decrement when secret word is sent to user if
user is logging in that period then only he/she can right to use
the facilities otherwise session terminated.
The algorithm is given as follows:
TOTP and HOTP are two variables. TOTP is based on HOTP
where timestamp substitutes the incrementing counter. The
current timestamp is turned into a time-counter by defining the
start of an epoch (T0) and counting in units of a time step (TS).
For example, TC = (unixtime(now) - unixtime(T0)) / TS
TOTP = HOTP (SecretKey, TimeCounter), where HOTP is
defined below.
TOTP-Value = TOTP(K,TC) mod 10d
, where d is the desired
number of digits
Let:
• K be a secret key
• C be a counter
• HMAC(K,C) = SHA1(K ⊕ 0x5c5c… ∥ SHA1(K ⊕
0x3636… ∥ C)) be an HMAC calculated with
the SHA-1 cryptographic hash algorithm
• Truncate is a function that selects 4 bytes from the result
of the HMAC in a defined manner
Then HOTP(K,C) is mathematically defined by
HOTP(K,C) = Truncate(HMAC(K,C)) &
0x7FFFFFFF
The mask is to disregard the most significant bit to
provide better interoperability between processors
For HOTP being useful for an individual to input to a
system, the result must be transformed into a HOTP
value, a 6–8 digit number that is implementation
dependent.
HOTP-Value = HOTP(K,C) mod 10d
, where d is the
desired number of digits
In the above algorithm HMAC and SHA algorithm is used to
compare OTP sent and received from client are same or not.
Fig 1: Flow of System
Figure 1 shows the flow of the system in which first part is a
Client OTP generator which will generate an OTP and send to
the client and wait for limited timestamp. The borrower is the
interface between the user and the client. Next is the OTP
module this module is the one which check that whether the
enter OTP and sent OTP are the same or not in that timestamp
if it is true then only the client get right to use to the web
services otherwise period rejected. And the SQL server is used
for the storage purpose.
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 527
Fig 2: OTP generation
Figure 2 shows that one counter is set for the OTP which
casually generate a number. Because of OTP is valid only for a
small duration of time and if in that duration OTP doesn't enter
then the session is rejected. So first initialize the counter, then
encrypts the message using HMAC and the key that message is
again encoded with decimal from which we get the OTP.
This paper uses the algorithm for key selection for HMAC. In
Fig: OTP generation is given as algorithm they first check that
the size of the key and the block size/ message size are the same
or not if it is not same then we have equalized the key to block
size if it is less than a block size, then by adding more zero to
the key if is greater than block size then it is shortened to block
size. And then apply the HMAC algorithm.
4. CONCLUSIONS
This paper offers soundness to the authentication which is
crucial in Wang, Yu, and Qi Xie scheme because they only offer
soundness and certificate privacy to their scheme which need
more safety for certification. The Wang, Yu, and Qi Xie scheme
uses RSA-VES algorithm which improve the Chang –Lee
scheme by providing user certificate privacy. But for assuring
the validation some extra technique is needed. For that One
Time Password is used with SSO. This paper explains how the
security can be upgraded using One Time Password. OTP can
valid only for tiny period of time, so that any new user or
invader if try to use the old secret word then the operation is
terminated. In this way One Time Password provide reliability
for the authentication.
REFERNCES
[1]. A. C. Weaver and M. W. Condtry, “Distributing internet
services to the network’s edge,” IEEE Trans. Ind. Electron.,
vol. 50, no. 3, pp. 404–411, Jun. 2003.
[2]. L. Lamport, “Secret word authentication with insecure
communication,” Commun. ACM, vol. 24, no. 11, pp. 770–772,
Nov. 1981.
[3]. W. B. Lee and C. C. Chang, “User identification and key
distribution maintaining anonymity for distributed systems,”
Comput. Syst. Sci. Eng., vol. 15, no. 4, pp. 113–116, 2000.
[4]. W. Juang, S. Chen, and H. Liaw, “Robust and efficient
secret word authenticated key agreement using smart cards,”
IEEE Trans. Ind. Electron., vol. 15, no. 6, pp. 2551–2556, Jun.
2008.
[5]. X. Li,W. Qiu, D. Zheng, K. Chen, and J. Li, “Anonymity
enhancement on robust and efficient secret word-authenticated
key agreement using smart cards,” IEEE Trans. Ind. Electron.,
vol. 57, no. 2, pp. 793–800, Feb. 2010.
[6]. T.-S.Wu and C.-L. Hsu, “Efficient user identification
scheme with key distribution preserving anonymity for
distributed systems,” Comput. Security, vol. 23, no. 2, pp. 120–
125, 2004.
[7]. Y. Yang, S. Wang, F. Bao, J. Wang, and R. H. Deng, “New
efficient user identification and key distribution scheme
providing enhanced security,” Computers and Security, Vol. 23,
No. 8, pp. 697-704, 2004.
[8]. K. V. Mangipudi and R. S. Katti, “A secure identification
and key agreement protocol with user anonymity (SIKA),”
Comput. Security, vol. 25, no. 6, pp. 420–425, 2006.
[9]. C.-L. Hsu and Y.-H. Chuang, “A novel user identification
scheme with key distribution preserving user anonymity for
distributed systems,” Inf. Sci., Vol. 179, No. 4, pp. 422-429,
2009.
[10]. H.-M. Sun, Y.-H. Chen, and Y.-H. Lin, “oPass: A user
authentication protocol resistant to secret word stealing and
secret word reuse attacks,” IEEE Trans. Inf. Forensics Security,
vol. 7, no. 2, pp. 651–663, Apr. 2012.
[11]. “Security Forumon Single Sign-On,” TheOpenGroup
[Online].Available: http://www.opengroup.org/security/l2-
sso.htm
[12]. J. Han, Y. Mu, W. Susilo, and J. Yan, “A generic
construction of dynamic single sign-on with strong security,” in
Proc. SecureComm’, 2010, pp. 181–198, Springer
[13]. C.-C. Chang and C.-Y. Lee, “A secure single sign-on
mechanism for distributed systems”, IEEE Trans. Ind.
Electron., vol. 59, no. 1, pp. 629–637, Jan. 2012.
[14]. G. Ateniese, “Verifiable encryption of digital signatures
and applications,”
ACM Trans. Inf. Syst. Secur., vol. 7, no. 1, pp. 1–20, 2004.
[15]. Guilin Wang, Jiangshan Yu, and Qui Xie,”Security
Analysis of a SSO mechanism for Distributed systems”, IEEE
Trans. In industrial informatics, vol.9, no.1,Feb.2013