Affiliation:
1. Government Polytechnic, Miraj, India
2. National Institute of Technology, Tiruchirappalli, India
Abstract
In text-based authentication, the passwords along with user names are maintained in the Authentication Data Table (ADT). It is necessary to preserve the privacy of passwords in ADT to avoid offline attacks like brute force attacks, lookup table attacks, etc. In this paper, three password protection schemes, namely Encrypted Image Password (EIP), Dynamic Authentication Data Table (D-ADT), and Extended Encrypted Image Password (EEIP) are proposed for secure authentication. In EIP, the input passwords are first converted to hashed passwords and then transformed into images. Next, these image passwords are encrypted using a novel image password encryption system using chaos functions and confusion-diffusion mechanisms. In D-ADT, the hashed passwords are encrypted using a random key. The major highlight of this scheme is that during every log, the hashed password is encrypted with a new random key while keeping the plain password same as it is. So, during each login of the user, the old encrypted password is replaced with a new encrypted password in the authentication data table. The EEIP scheme combines both approaches. Passwords are converted to images and image passwords are encrypted with the new random key at every login. Performance and security analysis are carried out for the proposed algorithm concerning correlation analysis, differential analysis, entropy analysis, computation time, keyspace, and offline attack analysis.
Subject
Computer Networks and Communications,Hardware and Architecture,Safety, Risk, Reliability and Quality,Software
Reference30 articles.
1. Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications;Abbasinezhad-Mood;Future Generation Computer Systems,2018
2. Users are not the enemy;Adams;Communications of the ACM,1999
3. M.C. Ah Kioon, Z.S. Wang and S. Deb Das, Security analysis of md5 algorithm in password storage, in: Applied Mechanics and Materials, Vol. 347, Trans Tech Publ, 2013, pp. 2706–2711.
4. Authentication systems: A literature review and classification;Barkadehi;Telematics and Informatics,2018
5. Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications