Title :
Security Analysis and Implementation of JUIT—Image Based Authentication System Using Kerberos Protocol
Author :
Chauhan, Durg Singh ; Sehgal, Vivek Kumar ; Mahanot, A. ; Singh, Prashant ; Ahuja, Satyajeet ; Shrivastava, U. ; Rana, M.M. ; Punjabi, V. ; Vinay, S. ; Sharma, Neelam
Author_Institution :
Dept. of CSE & IT, HCL Technol., Noida
Abstract :
Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along with being user friendly is required. This is where Image Based Authentication (IBA) comes into play. IBA encapsulates Kerberos Protocol, Version 5, and provides clients a completely unique and secured authentication tool to work on. This paper is a comprehensive study on the subject of using images as the password set and the implementation of Jaypee University of Information Technology (JUIT) IBA system called as JUIT-IBA. This tool provides a secure channel of communication between the communicating entities. The assortment of image set as client´s password aims at thwarting Brute Force attacks, Shoulder attack, and Tempest attack at the client side while the attacks at the server side can be averted by putting into practice Kerberos protocol. It also describes how our system works along with the evaluation of its performances in different computing environments.
Keywords :
authorisation; message authentication; protocols; telecommunication security; Brute Force attack; JUIT-IBA system; Jaypee University of Information Technology; Kerberos protocol; Shoulder attack; Tempest attack; image based authentication system; password set; performance evaluation; security analysis; Access protocols; Authentication; Cryptography; Information science; Information technology; Monitoring; Network servers; Protection; Security; Workstations; AJAX; Brute-force Attack; Diffie-Hellman key Exchange; Image Based Authentication System; Kerberos Protocol; Keystroke Logging; MySQL; Shoulder Attack; Tempest Attack;
Conference_Titel :
Computer and Information Science, 2008. ICIS 08. Seventh IEEE/ACIS International Conference on
Conference_Location :
Portland, OR
Print_ISBN :
978-0-7695-3131-1
DOI :
10.1109/ICIS.2008.93