A Cascaded Toolkit for User Authentication
Format:
Paperback
En stock
0.17 kg
Sí
Nuevo
Amazon
USA
- Authentication is a process that ensures a user’s identity. In the last two decades, researchers have derived new algorithms and information hiding models using authentication. There is a scope to develop a security toolkit by combining newly implemented independent models using authentication, all together in a cascading manner which provides better security for transmitting data as compared to the standard algorithms. The basic objective of the work is to design an integrated ciphering system or a so called, ‘security toolkit’. Such a system has been formed by combining a set of newly developed independent bit-level ciphering protocols. Each of these protocols ultimately has acted as the ‘building block’ for that implemented ‘security toolkit’. For the purpose of assessing each ‘building block’ which has been developed during the work, different standard algorithms and parameters have been used. ‘User authentication building blocks’ have been introduced based on "CAPTCHA" (Completely Automated Public Turing test to tell Computers and Humans Apart) code generated from personal information and "OTP" (One Time Password) formulated on bio-metric image. Three authentication schemes have been implemented namely “CAPTCHA Code based on User Personal information and Likings (CCUPL)”, “Secret Value based on Randomized One Time Password (SVROTP)” and “Numeric and bio-metric Image-based One Time Password (NIOTP)” for ‘authentication building blocks’. CAPTCHA or OTP generation time, their randomness and how they provide security over different network attacks have been considered as standard parameters for assessing the performances of newly implemented schemes. Based on all these and few more new parameters, the performance of each ‘building block’ has been compared with two selected standard existing protocols. After the successful completion of designing and developing all the ‘building blocks’ in an independent manner, all such blocks have been cascaded by formulating proper schematic characteristics as well as operational characteristics. A satisfactory outcome of implementing this ‘security toolkit’ in a stand-alone system has been experienced, which has indicated that the successful completion of this chain of actions has ultimately reached to the end of this research work.
IMPORT EASILY
By purchasing this product you can deduct VAT with your RUT number