An Innovative Multifactor Server Farm Established Key Exchange Tactics with Ultimate Technology
Author(s):
Ajosh Varughese , Christian College Of Engineering & Technology, Oddanchatram; Benson.B.Ukken , Christian College Of Engineering & Technology, Oddanchatram; Roopesh.R.Nair, Christian College Of Engineering & Technology, Oddanchatram; Abhilash.S, Christian College Of Engineering & Technology, Oddanchatram; D.Pradeep, Christian College Of Engineering & Technology, Oddanchatram
Keywords:
Authentication, security, ECC, image recolonization biometrics, Picture Puzzle
Abstract:
Typically, user authentication based on something that a user knows (typically a PIN, a password) or something that a user has (a key, a token, a magnetic or smart card, a badge, a passport etc.). Unfortunately, these traditional methods of the user authentication do not authenticate the user as such. Traditional methods are based on properties that can be forgotten (password), disclosed, lost or stolen (smart card)[9]. Nowadays, password authentication is the most common authentication system. A strong and efficient server farm authentication method using biometrics-based smart card and elliptic curve cryptography (ECC)[10][20]. In this paper, a new multi-factor authenticated key exchange method, which combines with biometrics, password and the picture puzzle is proposed[4]. Compared with the previous methods, this method has higher security in remote authentication and preserves privacy of biometrics, and most of the previous methods rely on the smart card to verify biometrics[3][15][16]. We then propose a new secure server farm authentication protocol using biometrics and ECC with more security functionalities. The advantage of these approaches is that the user’s biometrics is not shared with the remote server, which can resist insider’s attack and preserve the privacy of the biometrics. To achieve multifactor certification, a new function called one-way function with distance-keeping, which is used to preserve privacy of user’s biometrics, is popularised. It is proven secure under the random oracle and is suitable to the environment which lacked communication resource and needed higher security.
Other Details:
Manuscript Id | : | IJSTEV2I10037
|
Published in | : | Volume : 2, Issue : 10
|
Publication Date | : | 01/05/2016
|
Page(s) | : | 130-133
|
Download Article