CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

User Authentication System using Cryptography Involving Arithmetic Operations

by Saddam Husain, Ankur Sharma, Gaurav Gupta, Vijaishri Tewari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 6
Year of Publication: 2013
Authors: Saddam Husain, Ankur Sharma, Gaurav Gupta, Vijaishri Tewari
10.5120/11967-7810

Saddam Husain, Ankur Sharma, Gaurav Gupta, Vijaishri Tewari . User Authentication System using Cryptography Involving Arithmetic Operations. International Journal of Computer Applications. 70, 6 ( May 2013), 23-27. DOI=10.5120/11967-7810

@article{ 10.5120/11967-7810,
author = { Saddam Husain, Ankur Sharma, Gaurav Gupta, Vijaishri Tewari },
title = { User Authentication System using Cryptography Involving Arithmetic Operations },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 6 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 23-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number6/11967-7810/ },
doi = { 10.5120/11967-7810 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:32:10.382346+05:30
%A Saddam Husain
%A Ankur Sharma
%A Gaurav Gupta
%A Vijaishri Tewari
%T User Authentication System using Cryptography Involving Arithmetic Operations
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 6
%P 23-27
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The concept of having to identify an entity before being allowed to perform any action is quite acceptable, and expected, and required in today's wired world. Password managers, graphical systems, pattern recognition, biometrics have always been found to be incapable of providing robust security in some or the other aspect, in critical authentication systems [24]. In our approach, the user at the time of profile creation is required to enter the password, minimum of 6 characters and a secret numeric PIN of minimum 4 digits. Now during subsequent login attempts, the user will be asked to enter the password as an answer to a random mathematical question displayed in front of him in the form of an image (readable only by human and not by a software entity) [15]. Example; Consider the password: KOREAN and secret pin: 1234, the question would be; your 2nd character of password varies by 1+3rd character of your secret pin. Now instead of the original password, the user will enter the new password as KSREAN. The password can contain any combination of the available 96 characters on the keyboard. Every time only the same character of the password will be changed. The secret pin must contain only digits (to increase security, length can be increased to 10 or more digits). If the user enters the correct password he is authenticated otherwise denied access. This concept has some assumptions that the site locks the account if number of attempts for a particular user name exceeds a predetermined threshold.

References
  1. RossJ. Anderson, "Why Cryptosystems Fail". Communications of the ACM, 37(11):32-40, November 1994.
  2. Anne, Adams and Martina Angela Sasse, "Users are not the enemy: Why users compromise computer security mechanisms and how to take remedial measures". Communications of the ACM, 42(12):40-46, December 1999.
  3. W. Belgers, "Unix password security", 1993. "http://www. het. brown. edu/guide/UNIX-password-security. txt"
  4. D. W. Davies and W. L. Price, "Security for Computer Networks". John Wiley & Sons, Inc. New York, NY, USA ©1984. ISBN 0-471-90063-X
  5. Carl Ellison, Chris Hall, Randy Milbert, and Bruce Schneier. "Protecting secret keys with personal entropy", future Generation Computer Systems, v. 16, 2000, pp. 311-318, 2000.
  6. D. C. Feldmeier and P. R. Karn. "UNIX password security—ten years later (invited)", 1989. Lecture Notes in Computer Science Volume 435.
  7. Ralph Norman Haber. "How we remember what we see". Scientific American, 222, May 1970, l04-ll5.
  8. Ian Jermyn, Alain Mayer, Fabian Monrose, Michael K. Reiter, and Aviel D. Rubin. "The design and analysis of graphical passwords". In Proceedings of the 8th USENIX Security Symposium, August1999.
  9. The Knightmare. "Secrets of a Super Hacker". Loompanics Unlimited, Port Towns end, Washington, 1994. ISBN 13: 9781559501064.
  10. Rosa R. Heckle, Wayne G. Lutters, "Privacy Implications for Single Sign-on Authentication in a Hospital Environment", In proceeding of: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007.
  11. Michael D. Leonhard, V. N. Venkatakrishnan, "A Comparative Study of Three Random Password Generators". Proceedings of the IEEE Electro/Information Technology Conference (EIT) may 2007. Page 271—276.
  12. Dustin D. Trammell. "Mnemonic Password Formulas, Remembering Secure Passwords". May, 2007. "http://www. uninformed. org/?v=7&a=3. "
  13. Passlogix. v-go. WWW at "http://www. passlogix. com/, 2000".
  14. Sonia Chiasson, Paul van Oorschot, Robert Biddle "A Usability Study and Critique of Two Password Managers", 15th USENIX Security Symposium - July 2006. "https://www. usenix. org/conference/15th-usenix-security-symposium/usability-study-and-critique-two-password-managers"
  15. Sonia Chiasson, Paul van Oorschot, Robert Biddle "Graphical Password Authentication Using Cued Click Points". Proceedings of ESORICS 2007. 09/2007; DOI:10. 1007/978-3-540-74835-9_24 "http://www. researchgate. net/publication/225193580_Graphical_Password_Authentication_Using_Cued_Click_Points".
  16. Sonia Chiasson, Robert Biddle, Paul van Oorschot "A Second Look at the Usability of Click-Based Graphical Passwords", Proceedings of the Symposium on Usable Privacy and Security (SOUPS) 2007. Pages 1-12, ISBN: 978-1-59593-801-5
  17. Di Lin, Paul Dunphy, Patrick Olivier, Jianxin Jeff Yan, "Graphical Passwords & Qualitative Spatial Relations". Proceedings of the Symposium On Usable Privacy and Security (SOUPS) 2007, Pages 161-162.
  18. Ahmet Emir Dirik, Nasir Memon, Jean-Camille Birget. "Modeling User Choice in the PassPoints Graphical Password Scheme", Proceedings of the Symposium on Usable Privacy and Security (SOUPS) 2007, Pages 20-28.
  19. Katelin Bailey, Linden Vongsathorn, Apu Kapadia, Chris Masone, Sean W. Smith. "TwoKind authentication: usable authenticators for untrustworthy environments", Proceedings of the Symposium on Usable Privacy and Security (SOUPS) 2007, Pages 169-170.
  20. Michael D. Leonhard, V. N. Venkatakrishnan. "A Comparative Study of Three Random Password Generators", Proceedings of the IEEE Electro/Information Technology Conference (EIT) 2007, Page(s): 227 – 232.
  21. Sonia Chiasson, Robert Biddle. "Issues in User Authentication", CHI 2007 Workshop on Security User Studies - April 2007. "http://www. verbicidal. org/hcisec-workshop/papers/chiasson. pdf".
  22. Shirley Gaw, Edward W. Felten. "Password Management Strategies for Online Accounts". Proceedings of the Symposium on Usable Privacy and Security (SOUPS) 2006, Pages 44 – 55.
  23. Steven Furnell, Leith Zekri. "Replacing Passwords: In Search of the Secret Remedy", Network Security, Volume 2006, Issue 1, Pages 4-8.
  24. Steven Furnell. "Authenticating Ourselves: Will We Ever Escape the Password?" Network Security, Volume 2005, Issue 3, Pages 8-13.
  25. Rachna Dhamija, Adrain Perrig. "Deja Vu:A User Study Using Images for Authentication". Proceedings of the 9th USENIX Security Symposium, USENIX Association, 2000, Pages 4 – 4.
Index Terms

Computer Science
Information Sciences

Keywords

Information security user authentication cryptography phishing click recorders screen recorders arithmetic operations