Password Authentication Based on Fractal Coding Scheme
نویسندگان
چکیده
منابع مشابه
Password Authentication Based on Fractal Coding Scheme
Password authentication is a mechanism used to authenticate user identity over insecure communication channel. In this paper, a new method to improve the security of password authentication is proposed. It is based on the compression capability of the fractal image coding to provide an authorized user a secure access to registration and login process. In the proposed scheme, a hashed password s...
متن کاملWeaknesses of Password Authentication Scheme Based on Geometric Hashing
We show that a recently proposed password authentication scheme based on geometric hashing has several security weaknesses, and that the use of this scheme should be avoided in practice.
متن کاملA Simple Password Authentication Scheme Based on Geometric Hashing Function
Password authentication protocol is one of most important mechanisms to prevent resources from accessing by unauthorized users. Many password authentication schemes have been developed in last decades, and many of them are based on the use of smart card. However, nowadays it is not applicable for many applications on the Internet to adopt the smart card in their authentication scheme due to its...
متن کاملA Hybrid Password Authentication Scheme Based on Shape and Text
Textual-based password authentication scheme tends to be more vulnerable to attacks such as shouldersurfing and hidden camera. To overcome the vulnerabilities of traditional methods, visual or graphical password schemes have been developed as possible alternative solutions to text-based password schemes. Because simply adopting graphical password authentication also has some drawbacks, schemes ...
متن کاملCryptanalysis of a smart card based secure password authentication scheme
Recently, Wang and Chang proposed a password authentication scheme is embedded in a smart card. This new verifier authenticates the login password key in without password table adoption. The safety aspects for this protocol were constructed on the basis of intensity factors and discrete logarithm. Nonetheless, in the year of 2008, Yoon et al. pointed out that there was a security loophole withi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Applied Mathematics
سال: 2012
ISSN: 1110-757X,1687-0042
DOI: 10.1155/2012/340861