To search, Click below search items.

 

All Published Papers Search Service

Title

An Image Based Authentication System- Using Needham Schroeder Protocol

Author

Raman Kumar, Asmita Puri, Vivek Gautam, Saumya Singla

Citation

Vol. 10  No. 11  pp. 135-140

Abstract

With the upcoming technologies available for hacking text based passwords, there is a need to provide users with a secure environment that protect their resources against unauthorized access by enforcing control mechanisms. To counteract the increasing threat, Image Based Authentication (IBA) has been introduced. Apart from being more secure than usual text based passwords, IBA has proved to be an asset as it is user friendly. IBA generally encapsulates the Needham Schroeder Protocol (NSP) and provides client a completely unique and secured authentication tool to work on. This paper however proposes a hypothesis regarding the use of Needham Schroeder Protocol and is a comprehensive study on the subject of using images as the password set. This forms the basis for a secure communication between the communicating entities. The assortment of image set as client¡¯s password set aims at thwarting reply attacks. The paper also evaluates the performance of this method in terms of its efficiency and time taken. Password authentication protocols are important mean of user authentication on network. Several password authentication protocols have been introduced each claiming to withstand to the several attacks, including replay, password file compromise, denial of service, etc. Then, we present an improvement to the Needham-Schroeder Protocol, in order to remove two possible attacks. Therefore, the proposed scheme is secure and efficient against notorious conspiracy attacks.

Keywords

Image Based Authentication (IBA), Needham Schroeder Protocol (NSP), Protocol, Attacks, Shoulder Attack, Tempest Attack, Brute Force Attack, Replay Attack and Other Attacks

URL

http://paper.ijcsns.org/07_book/201011/20101122.pdf