Authentication System based on Hash Function - A Review

Authors(2) :-Kaushal KishorSah, Dr. R Chinnaiyan

Authentication is the process whereby the system identifies legitimate users from unauthorized users. It is the process in which a user identifies his/her self to the system. How effective an authentication process is determined by the authentication protocols and mechanisms being used. Windows Server 2003 provides a few different authentication types which can be used to verify the identities of network users.This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system is based on hash function, and mobile users only do symmetric encryption and decryption. In our system, it takes only one round of messages exchange between the mobile user and the visited network, and one round of message exchange between the visited network and the corresponding home network.

Authors and Affiliations

Kaushal KishorSah
Student of MCA VI Semester, New Horizon College of Engineering, Bangalore, Karnataka, India
Dr. R Chinnaiyan
Professor, Department of Master of Computer Applications, New Horizon College of Engineering, Bangalore, Karnataka, India

Authentication , Hash Function, Grid , Encryption , Decryption

  1. R. Dhamija, and A. Perrig, "Deja vu: A User study  Using Images for Authentication" , In 9th Unisex  Security Symposium, 2000.
  2. Real User  Corporation :  Passfaces.
  3. Scheier, Bruce , "Cryptanalysis of MD5 and SHA:  Time for a New Standard" , Computerworld, retrieved  15 October 2014.
  4. Authentication Schemes for Session Passwords using  Color and Images International Journal of NetworkSecurity & Its Applications (IJNSA), Vol.3, o3, May 2011

Publication Details

Published in : Volume 3 | Issue 4 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1121-1125
Manuscript Number : CSEIT1833345
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Kaushal KishorSah, Dr. R Chinnaiyan, "Authentication System based on Hash Function - A Review", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.1121-1125, March-April-2018.
Journal URL :

Article Preview