Authentication System based on Hash Function - A Review
Keywords:
Authentication , Hash Function, Grid , Encryption , DecryptionAbstract
Authentication is the process whereby the system identifies legitimate users from unauthorized users. It is the process in which a user identifies his/her self to the system. How effective an authentication process is determined by the authentication protocols and mechanisms being used. Windows Server 2003 provides a few different authentication types which can be used to verify the identities of network users.This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system is based on hash function, and mobile users only do symmetric encryption and decryption. In our system, it takes only one round of messages exchange between the mobile user and the visited network, and one round of message exchange between the visited network and the corresponding home network.
References
- R. Dhamija, and A. Perrig, "Deja vu: A User study Using Images for Authentication" , In 9th Unisex Security Symposium, 2000.
- Real User Corporation : Passfaces. www.passfaces.com
- Scheier, Bruce , "Cryptanalysis of MD5 and SHA: Time for a New Standard" , Computerworld, retrieved 15 October 2014.
- Authentication Schemes for Session Passwords using Color and Images International Journal of NetworkSecurity & Its Applications (IJNSA), Vol.3, o3, May 2011
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.