Genuine onion: Simple, Fast, Flexible, and Cheap Website Authentication
نویسندگان
چکیده
Tor is a communications infrastructure widely used for unfettered and anonymous access to Internet websites. Tor is also used to access sites on the .onion virtual domain. The focus of .onion use and discussion has traditionally been on the offering of hidden services, services that separate their reachability from the identification of their IP addresses. We argue that Tor’s .onion system can be used to provide an entirely separate benefit: basic website authentication. We also argue that not only can onionsites provide website authentication, but doing so is easy, fast, cheap, flexible and secure when compared to alternatives such as the standard use of TLS with certificates.
منابع مشابه
Cheap and Easy PIN Entering Using Eye Gaze
PINs are one of the most popular methods to perform simple and fast user authentication. PIN stands for Personal Identi cation Number, which may have any number of digits or even letters. Nevertheless, 4-digit PIN is the most common and is used for instance in ATMs or cellular phones. The main advantage of the PIN is that it is easy to remember and fast to enter. There are, however, some drawba...
متن کاملA Hybrid Authentication Mechanism for Preventing Phishing Attacks on E-banking Systems: The Nigeria Case Study
This paper presents multifactor authentication method for securing access to e-banking systems in Nigeria using fingerprint recognition and SiteKey authentication. Fingerprint authentication is based on the notion of fingerprint individuality; the idea that fingerprint image of an individual is unique and can be used to uniquely identify him/her. SiteKey authentication on the other hand, uses a...
متن کاملThe Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST)
This document defines the Extensible Authentication Protocol (EAP) based Flexible Authentication via Secure Tunneling (EAP-FAST) protocol. EAP-FAST is an EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) to establish a mutually authenticated tunnel. Within the tunnel, Type-Length-Value (TLV) objects are used to convey authentica...
متن کاملImage Based Authentication for Phishing using Visual Cryptography
With the advent of internet, various online attacks have been increased and among them the most popular attack is phishing. Phishing is an attempt by an individual or a group to get personal confidential information such as passwords, credit card information from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Fake websites which appear very similar to t...
متن کاملShrinking the Authentication Footprint
Developers create paths for users to tread. Some users will stay on the beaten track; others will diverge and take risky shortcuts. If user-preferred and developer-created paths diverge too much, it is time for the developer to consider a new path. A case in point is the humble password. They fill an important developer need: a cheap and easy mechanism to control access and enforce accountabili...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1506.04115 شماره
صفحات -
تاریخ انتشار 2015