.

Sunday, August 18, 2019

Essay examples --

INTRODUCTION: In general, Password-based authentication protocols are enormously used for logging to servers located remote or local. They also provide authentication between the client and the server to assure both parties‟ legality†. However an attacker may find the passwords. Therefore a designer usually uses a scheme with password changing function. However other than schemes which are anonymous, all the others in the literature cannot satisfy the three important properties: (1) two passes to reduce the network traffic and increase system performance , (2) the anonymity, and (3) the ten security features proposed by Liao et al.. In the scheme, we let the secret keys of both the user and the server be x and y, respectively which are embedded in three properties. The biometric authentication system offers several advantages over other security methods. Password might be forgotten and thus smart card might be shared,lost,or stolen.In contrast ,personal biometric such as fingerprints has no such drawbacks.Remote authentication is form of e_authentcation in which user as proof of adenitis as admitted over a network connection. There are two problems in applying personal bio-metrics. (1) obtaining easily some bio-metric characteristics, so that the results can never changed, (2)the difficulty of checking whether the device is capable of verifying that a person is alive. Due to such problems the best way is to integrate bio-metrics with password and smart card to construct a three secure factor authentication scheme. Client server system scenario usually a password based authentication scheme is widely used in order to identify the remote user. But the simple passwords are always easy to break using simple di... ...nge Phase When U wants to change his password from following steps. Step 1: U inserts his smart card, and inputs his IDu, PWu, the new password PWu’, and pc. Step 2: The smart card computes u=h(IDu||PWu||x),h(IDu||IDs||y)=Râ™ pcâ™ u, and checks to see whether O=h(h(pc||u)||h(h(IDu||IDs||y)||u)) holds. If it holds, the smart card computes u’=h(IDu||PWu’||x),R’=pcâ™ h(IDu||IDs||y)â™ u’, O’=h(h(pc||u’)||h(h(IDu||IDs||y)||u’)),A’=Aâ™ h(IDu||PWu||x)â™ h(IDu||PWu’||x), and then updates R, O, A with R’, O’, A’, respectively. Conclusions We have proposed secure and efficient biometrics-based remote user authentication. The proposed scheme can effectively withstand the replay attack,the imper- sonating attack, and the man-in-the-middle attacks.The proposed scheme enhance the security, but furthermore, this result reduces the communication and computation costs. Essay examples -- INTRODUCTION: In general, Password-based authentication protocols are enormously used for logging to servers located remote or local. They also provide authentication between the client and the server to assure both parties‟ legality†. However an attacker may find the passwords. Therefore a designer usually uses a scheme with password changing function. However other than schemes which are anonymous, all the others in the literature cannot satisfy the three important properties: (1) two passes to reduce the network traffic and increase system performance , (2) the anonymity, and (3) the ten security features proposed by Liao et al.. In the scheme, we let the secret keys of both the user and the server be x and y, respectively which are embedded in three properties. The biometric authentication system offers several advantages over other security methods. Password might be forgotten and thus smart card might be shared,lost,or stolen.In contrast ,personal biometric such as fingerprints has no such drawbacks.Remote authentication is form of e_authentcation in which user as proof of adenitis as admitted over a network connection. There are two problems in applying personal bio-metrics. (1) obtaining easily some bio-metric characteristics, so that the results can never changed, (2)the difficulty of checking whether the device is capable of verifying that a person is alive. Due to such problems the best way is to integrate bio-metrics with password and smart card to construct a three secure factor authentication scheme. Client server system scenario usually a password based authentication scheme is widely used in order to identify the remote user. But the simple passwords are always easy to break using simple di... ...nge Phase When U wants to change his password from following steps. Step 1: U inserts his smart card, and inputs his IDu, PWu, the new password PWu’, and pc. Step 2: The smart card computes u=h(IDu||PWu||x),h(IDu||IDs||y)=Râ™ pcâ™ u, and checks to see whether O=h(h(pc||u)||h(h(IDu||IDs||y)||u)) holds. If it holds, the smart card computes u’=h(IDu||PWu’||x),R’=pcâ™ h(IDu||IDs||y)â™ u’, O’=h(h(pc||u’)||h(h(IDu||IDs||y)||u’)),A’=Aâ™ h(IDu||PWu||x)â™ h(IDu||PWu’||x), and then updates R, O, A with R’, O’, A’, respectively. Conclusions We have proposed secure and efficient biometrics-based remote user authentication. The proposed scheme can effectively withstand the replay attack,the imper- sonating attack, and the man-in-the-middle attacks.The proposed scheme enhance the security, but furthermore, this result reduces the communication and computation costs.

No comments:

Post a Comment