Strong Zero-knowledge Authentication Based on Virtual Passwords
نویسندگان
چکیده
Currently, the security of the users’ privacy in public spaces has more concerns especially in web applications. Also, the unconsciousness of users by the importance of the quality cryptographic of these authentication parameters makes their commoditized accounts. Hence, investment in the computer discipline becomes more demanding to prevent potential attacks. In this paper, we introduce a new strong zero knowledge authentication system based on virtual passwords (SAVP). Its objective of this paper is to ensure the identification of users on the network by ensuring intractability, portability, unpredictability, integrity and reusability of their authentication settings. In the second section, we study the difficulties and users habits followed in the selection, storage or memorizing passwords, as well, the evolution and the limits of all categories of texture password authentication. Also, we locate the importance of integration of salts in authentication mechanisms and their impacts on the robustness of passwords regenerated. As for the third section, we start with a detail description of all mechanisms and component contributing to the robustness of our mutual authentication system. Our goal is to provide a strong zero knowledge authentication system based on salts generated by a cryptographically secure random regenerator, algorithm for dynamic rotation of binary strings, symmetric cryptography primitive, one-way hash function and random nonce to provide mutual authentication. The security analysis of our proposal, which is the goal of the fourth section, shows their ability to resist against multiple types of attacks.
منابع مشابه
The usability of picture passwords
Executive summary In the context of growing identify theft, and especially phishing and related scams, conventional passwords no longer provide adequate authentication security for online services. 'Zero-footprint' strong authentication (i.e. requiring no software installs or hardware tokens) can be achieved with careful use of picture passwords, i.e. sequences of picture symbols. The pic...
متن کاملZero-Knowledge Password Policy Checks and Verifier-Based PAKE
Zero-Knowledge Password Policy Checks (ZKPPC), introduced in this work, enable blind registration of client passwords at remote servers, i.e., client passwords are never transmitted to the servers. This eliminates the need for trusting servers to securely process and store client passwords. A ZKPPC protocol, executed as part of the registration procedure, allows clients to further prove complia...
متن کاملZero-Knowledge Password Policy Check from Lattices
Passwords are ubiquitous and most commonly used to authenticate users when logging into online services. Using high entropy passwords is critical to prevent unauthorized access and password policies emerged to enforce this requirement on passwords. However, with current methods of password storage, poor practices and server breaches have leaked many passwords to the public. To protect one’s sen...
متن کامللبخوانی: روش جدید احراز هویت در برنامههای کاربردی گوشیهای تلفن همراه اندروید
Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...
متن کاملNew Random Generator of a Safe Cryptographic Salt Per Session
Nowadays, client authentication in Web applications for each user based on passwords and a statically salts [11, 13, 18, 19]. The aim of this article is to propose random generator of a safe cryptographic salt per session (RGSCS). The interest to introduce this regenerator is to contribute to the evolution of the cryptographic quality of the systems of strong zero knowledge authentication based...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 18 شماره
صفحات -
تاریخ انتشار 2016