首页> 外文会议>International Symposium on Networks, Computers and Communications >Two Factor Hash Verification (TFHV): A Novel Paradigm for Remote Authentication
【24h】

Two Factor Hash Verification (TFHV): A Novel Paradigm for Remote Authentication

机译:两个因子哈希验证(TFHV):用于远程认证的新型范式

获取原文

摘要

Current paradigms for client-server authentication often rely on username/password schemes. Studies show such schemes are increasingly vulnerable to heuristic and brute-force attacks. This is either due to poor practices by users such as insecure weak passwords, or insecure systems by server operators. A recurring problem in any system which retains information is insecure management policies for sensitive information, such as logins and passwords, by both hosts and users. Increased processing power on the horizon also threatens the security of many popular hashing algorithms. Furthermore, increasing reliance on applications that exchange sensitive information has resulted in increased urgency. This is demonstrated by a large number of mobile applications being deemed insecure by Open Web Application Security Project (OWASP) standards. This paper proposes a secure alternative technique of authentication that retains the current ecosystem, while minimizes attack vectors without inflating responsibilities on users or server operators. Our proposed authentication scheme uses layered encryption techniques alongside a two-part verification process. In addition, it provides dynamic protection for preventing against common cyber-attacks such as replay and man-in-the-middle attacks. Results show that our proposed authentication mechanism outperform other schemes in terms of deployability and resilience to cyber-attacks, without inflating transaction’s speed.
机译:客户端 - 服务器身份验证的当前范例通常依赖于用户名/密码方案。研究表明,这些方案越来越容易受到启发式和蛮力的攻击。这是由于用户不安全的密码或服务器运算符的不安全系统等良差。保留信息的任何系统中的重复问题是敏感信息的不安全管理策略,例如主机和用户,例如登录信息,如登录信息。增加地平线的处理能力也威胁着许多流行散列算法的安全性。此外,越来越依赖于交换敏感信息的应用导致紧迫性增加。这是通过开放的Web应用程序安全项目(OWASP)标准被视为不安全的大量移动应用程序来证明。本文提出了一种安全的替代技术,保留了当前生态系统,而最大限度地减少攻击向量,而不会对用户或服务器运营商造成责任。我们所提出的认证方案使用分层加密技术与两部分验证过程一起。此外,它还为防止普通网络攻击提供动态保护,例如重播和中间人攻击。结果表明,我们所提出的认证机制在即可倾向于对网络攻击的部署性和弹性方面优于其他方案,而不会膨胀交易速度。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号