DocumentCode :
2958035
Title :
Passcode based authentication protocol: Part I — Solution evaluation and software design
Author :
Diaconu, Adrian-viorel
Author_Institution :
Educ. Instn., Lumina Found., Bucharest, Romania
fYear :
2010
fDate :
16-18 Sept. 2010
Firstpage :
204
Lastpage :
210
Abstract :
Usually, any communication begins by establishing the identity of partners (one over the other, or to a system that grants access to certain resources), the general settings for an identification protocol assuming the existence of a prover or claimant (referred to as USER) and a verifier in whose terms the outcome of an entity authentication protocol being either acceptance of the claimant\´s identity as authentic (completion with acceptance), or termination without acceptance (rejection). Although individually widely used, all vulnerabilities outlined in service, for each authentication scheme in hand (based on something known, owned by USER or inherent to him), advanced the idea of combining them in order to increase the "strength" of resulted protocol. This article aims at presenting a method for implementing an authentication protocol, which combines the two basic schemes (something known to the user or something owned by him), efforts were focused on highlighting the elements of software design and the basic procedures of the proposed authentication system. Also, an assessment is made on strength of passcode by quantifying the average time scrolling passcodes space to reach a specific combination. Taking into account that the criteria are “worst case scenario” type (for this kind of evaluation) in the following are proposed and evaluated two methods for enhancing / increasing the average time scrolling the space, one of them being implemented in the case of the presented authentication scheme. If in this first part of the paper software implementation, performance and security issues are discussed, in second part (which will be published in next issue of the journal) will be dealt topics related to hardware implementation.
Keywords :
authorisation; protocols; software engineering; authentication protocol; identification protocol; passcode; software design; Authentication; Clocks; Correlation; Databases; Generators; Protocols; Registers; GT64 type GSM module; LFSRs; challenge; hash function; passcode; smartcard;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electrical and Electronics Engineering (ISEEE), 2010 3rd International Symposium on
Conference_Location :
Galati
Print_ISBN :
978-1-4244-8406-5
Type :
conf
DOI :
10.1109/ISEEE.2010.5628514
Filename :
5628514
Link To Document :
بازگشت