Title :
Two level efficient user authentication scheme
Author :
Bardis, Nikolaos G. ; Doukas, Nikolaos ; Markovskyi, Oleksandr P. ; Drigas, Athanasios
Author_Institution :
Dept of Math. & Eng. Sci., Hellenic Army Acad., Vari, Greece
Abstract :
User authentication procedures are a computer system´s first line of defense against malicious attacks that could potentially jeopardize its availability and reliability. Computational complexity considerations may prevent system designers from implementing efficient authentication procedures. This paper presents a robust two level authentication procedure is presented that is highly efficient and suitable for multi-user systems. Authentication is attained in only a single cycle of exchanges between the user and the authentication system. Further advantages arise from the fact that with the proposed technique, it is not necessary to store lists of passwords and therefore the overhead caused in systems with large numbers of registered users is minimal. The proposed architecture is shown to be reliable while creating significant economies in the amount of information that needs to be stored. These facts therefore render the architecture highly suitable for hardware implementations.
Keywords :
authorisation; computer system; malicious attacks; multiuser system; password; system availability; system reliability; user authentication; Authentication; Computer architecture; Computers; Conferences; Cryptography; Protocols; Authentication; Multi user systems; Secure non - volatile memory;
Conference_Titel :
Digital Ecosystems and Technologies (DEST), 2010 4th IEEE International Conference on
Conference_Location :
Dubai
Print_ISBN :
978-1-4244-5551-5
DOI :
10.1109/DEST.2010.5610605