CFP last date
20 May 2024
Reseach Article

A New Advanced User Authentication and Confidentiality Security Service

by Sanjay Majumder, Sanjay Chakraborty, Suman Das
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 93 - Number 11
Year of Publication: 2014
Authors: Sanjay Majumder, Sanjay Chakraborty, Suman Das
10.5120/16257-5904

Sanjay Majumder, Sanjay Chakraborty, Suman Das . A New Advanced User Authentication and Confidentiality Security Service. International Journal of Computer Applications. 93, 11 ( May 2014), 4-11. DOI=10.5120/16257-5904

@article{ 10.5120/16257-5904,
author = { Sanjay Majumder, Sanjay Chakraborty, Suman Das },
title = { A New Advanced User Authentication and Confidentiality Security Service },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 93 },
number = { 11 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 4-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume93/number11/16257-5904/ },
doi = { 10.5120/16257-5904 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:15:30.794721+05:30
%A Sanjay Majumder
%A Sanjay Chakraborty
%A Suman Das
%T A New Advanced User Authentication and Confidentiality Security Service
%J International Journal of Computer Applications
%@ 0975-8887
%V 93
%N 11
%P 4-11
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Network & internet security is the burning question of today's world and they are deeply related to each other for secure successful data transmission. Network security approach is totally based on the concept of network security services. In this paper, a new system of network security service is implemented which is more secure than conventional network security services. This technique is mainly deals with two essential network security services, one is user authentication and other is data confidentiality. For user authentication this paper introduces 'Graphical Username' & 'Voice Password' approaches which provides better security than conventional 'username '& 'password' authentication process. In data confidentiality section this paper introduces two layer private key for both message encryption & decryption which is mainly applicable on 8 bit plain text data. This paper also provides the hints of introducing other two network security services (integrity and non-repudiation) as a future work.

References
  1. Leslie Lamport, November 1981, Password Authentication with Insecure Communication. Technical Note. Communication of the ACM.
  2. Christopher Mallow. Authentication Method & Techniques.
  3. Robert Muller & Raul Sanchez-Reillo 2009, An Approach to Biometric Identity Management Using Low-Cost Equipment. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
  4. Uke Loskit, May 2012, Adaptive Vocal Random Challenge Support for Biometric Authentication. Bachelor's Thesis. University of Tartu.
  5. Ayushi, 2010, A symmetric Key Cryptographic Algorithm. International Journal of Computer Application.
  6. CryptoGraphics: Secret Key Cryptography Using Graphics Card.
  7. M. A. Anusuya, S. K. Katti, 2009, Speech recognition by machine: A Review, International Journal of Computer Science & Information Security.
Index Terms

Computer Science
Information Sciences

Keywords

Graphical Username Voice password Private key cryptography Plain text Cipher text.