Cryptography Based Authentication Methods (original) (raw)

A Review on Authentication Methods

HAL (Le Centre pour la Communication Scientifique Directe), 2013

The Internet has consolidated itself as a very powerful platform that has changed the communication and business transactions. Now, the number of users navigating through the Internet is more than 2.4 billions. This large audience demands online commerce, knowledge sharing, social networks etc., which grew exponentially over the past few years. Thus, it leads to the need for security and enhanced privacy. In recent days, fraud over the Internet constitutes one of the main drawbacks for the widespread of the use of commercial applications. Therefore, the three vital security issues take place every day in our world of transparent fashion, more precisely: identification, authentication and authorisation. An identification is a process that enables recognition of an entity, which may be either a human, a machine, or another asset such as a software programme. In security systems, authentication and authorisation are two complementary mechanisms for determining who can access the information resources over a network. Many solutions have been proposed in the literature, from a simple password to recent technologies based on RFID (Radio Frequency IDentification) or biometrics (Mahier et al., 2008). This paper provides an overview on existing authentication methods, and its pros and cons when designing an online service.

An authentication model based on cryptography

2021

In this paper we proposed an authentication technique based on the user cards, to improve the authentication process in systems that allows remote access for the users, and raise the security rate during an exchange of their messages. in this technique the server performs two functions, the first function, register the users, and give him user ID, PIN code, and user private card contains secrecy information, which is used to encrypt user messages by using two kinds of encryption symmetric using RC4-Pr and asymmetric using RSA encryption., the second function, distribute the user's public card if the user demand that, in which the user sends the own authentication code with their own user ID and recipient user ID to the authentication check, and then the server sends the user public card to the recipient user, thus the sender user can send the messages to recipient user without back to the server again. We attained confidentiality using RC4-Pr and RSA encryption and message authe...

Process of Biometric Authentication and Its Application-A Review

The Biometrics are become the most popular technique now a day due to its liability and security. Earlier method of establishing a person's Authenticate includes knowledge based like password or token base like ID cards. These identities may be lost stolen or shared by any person. It prevents fraud usage of ATMs, mobiles, PCs, smart cards etc. Another feature of biometric is its efficiency. It is very easy to use and handle. Biometric uses fingerprint, eye patterns (IRIS recognition), hand geometric, facial expression, voice recognition, and signature analysis etc which are detailed explained in this paper. With the use of unique characteristics of person; various biometrics authentication devices have been developed and in use which are also reviewed in this paper.

Authentication systems: A literature review and classification

One of the most important parts of any system is authentication. Appreciated as the first and the last line of defense in the great majority of cases, authentication systems can usually prevent the kleptomaniac from unauthorized accessing to users' data. However, the traditional text-based password is still used in many websites and applications which are vulnerable to different kinds of attacks. Accordingly, there exist some other alternative ways to boost this traditional method. In this study, we classified and identified different types of authentication systems in a variety of platforms. Their usage, similarity, usability, performance and drawbacks were discussed. The goal of this study is to provide useful, classified information with the aim of understanding of how different authentication systems work and of what their usability and drawbacks are to the readers.

Modern Authentication Methods: A Comprehensive Survey

AI, Computer Science and Robotics Technology

This paper presents a comprehensive investigation of modern authentication schemes. We start with the importance of authentication methods and the different authentication processes. Then we present the authentication criteria used and we perform a comparison of authentication methods in terms of universality, uniqueness, collectability, performance, acceptability, and spoofing. Finally, we present multi-factor authentication challenges and security issues and present future directions.

A General Approach of Authentication Scheme and its Comparative Study

The field of information security is a vast area which is continually evolving and expanding relative to network data and global communication security. This literature review contrasts the research that has been published in the area of cryptography and authentication protocols, by providing a comparative and analytical study to secure the web servers and services.

Authentication

2014

Abstract-- This work is used for making transaction such as doing payment, transferring funds/money, doing online transaction via android Smartphone platforms for prominent mobile payment. This work combines a pair of Smartphone for apparent transaction, Server and paying client. These devices are featuring 3 types of authentication in this work to make a simpler and secure transaction than credit cards/atm cards/debit cards or other electronic payment cards.3 type of authentication consists of Password authentication, USIM card authentication and biometric facial authentication. This work offers simple but practical method for face recognition, eigenvectors.Eigenvectors known as eigenfaces is the approach for recognition in face classification. Research shows that proposed work have developed a near real time computer system that can locate and track a subject head and then recognize the person by comparing characteristic of the face to those of known individual. Keywords- Android,...

Authentication Methods: A Conceptual Review

2020

In order to access any of the information or data, we require to authenticate the user so that only the authorized users can access the data. With the development of science and technology there are number of authentication methods and this paper reviews the various types of available authentication schemes and methods Keyword: Graphical Passwords, Grid Passwords, Security,

A New Approach for Authentication Technique

Journal of Computer Science, 2005

One of the serious problems is how to authenticate the passport document for its holder. The major factor of this authenticity is the corresponding of the Passport's photo with its holder. Most of the Passport document contains a holder's signature in addition, of course, to the full name. We propose a firm authentication method by extracting some features for the original name of the holder with the passport number and digest them in a form, by applying some techniques, that can be hidden in the passport's photo. The modern method of issuing a passport now is by using a computer in fixing the passport's photo (imaging). In using this method we could hide the invisible watermark which contains the digest name and passport number inside the passport's photo. During the hidden process there are many techniques could be applied to disguise any color difference appears during the hidden process. After using this technique, it is very simple to use the computer in scanning and verifying, at check point, that the passport's photo has been not replaced and that by comparing the invisible watermark with the digest name of the holder and passport number.