The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Passwords are still the predominant mode of authentication in contemporary information systems, despite a long list of problems associated with their insecurity. Their primary advantage is the ease of use and the price of implementation, compared to other systems of authentication (e.g. two-factor, biometry, …). In this paper we present an analysis of passwords used by students of one of universities...
Network security is often neglected even by users. This paper deals with user authentication in a network environment and offers analysis of this topic and possibilities how to increase its security by cryptographic methods. A synthetic part provides a detailed description of the design of a simple web application to authenticate users with protection against selected attacks and also its practical...
Traditional authentication methods are vulnerable to different types of attacks. The authentication scheme like password or PIN-based have proven to be vulnerable to different forms of observation attacks such as, video-recording, key-logging or shoulder surfing attacks. In order to reduce these type of attacks, a number of solutions have been proposed. More used proposed system is the cognitive authentication...
Despite being the most widely used method of authentication, passwords still pose a significant threat to an information system's security. This threat is mostly attributed to the human factor, as users tend to select passwords that are easy to remember, but are not resilient to brute force or dictionary attacks. Worse yet, when not prompted to change their passwords on a regular basis the users tend...
This paper studies the current status and advance of study of password cracking. First, we give a classification for password cracking from different dimensions. We studies brute-force cracking, dictionary cracking and rainbow table cracking. We found some new techniques such as brute-force cracking based on probability method, Markov models and data mining. High performance computing in password...
Graphical passwords have been proposed as an alternative to textual passwords, due to its complexity that users are having in remembering their password combination. Graphical password was introduced by Blonder in 1996, which was easier to remember because of its graphical content. Therefore usability and memo ability are improved. In this paper, we propose and develop a new graphical password called...
Recently, Cipresso et al proposed a novel method for generating textual passwords. The PsychoPass password can be created, memorized and recalled by thinking of an action sequence instead of a string of characters. Objective: The objective of this paper is to analyze how and when the PsychoPass passwords are resilient to brute force attacks and how they compare to randomly generated ones. Methods:...
E-banking services vitally need comprehensive secure and simple authentication methods in order to be universally spread. In this paper, a new method of authentication was proposed and tested. This method uses templates in addition to passwords which are received in registration process. Template provides benefits of one-time passwords in practice, and can thwart common attacks of the context. Template...
The two-factor authentication scheme combined password with smart card is one of the most widely used methods. This paper analyzes the security performance of a latest proposed remote user authentication scheme and simulates the attacks it suffers: it's vulnerability to the password guessing attack, the server masquerade attack and lacks of password backward security. Based on the detailed security...
The main weakness of passwords is that it is vulnerable to dictionary attacks implemented by automated programs. As the EKE protocol could resist the offline dictionary attack and the CAPTCHA could avoid automatic on-line dictionary attack implemented by the attacker, in this paper, based on the two protocols, we proposed the hybrid password authentication protocols. Our new password authentication...
Spywares has become major problem now days. This type of software may track user activities online and offline, provide targeted advertising and/or hold in other types of uninvited activities. Password collection by spywares is increasing at a shocking pace [1]. The problem of entering sensitive data, such as passwords, from an untrusted machine, is obviously undesirable, however roaming users generally...
In 2007, Shim pointed out that AuthA protocol which is in the process of being standardized by IEEE are vulnerable to chosen protocol attacks and then suggested some coun- termeasures against the attacks. In this paper, we demonstrate another vulnerability of Shim's improved AuthA protocol and then present an improvement to repair the security flaws of the protocol.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.