Title :
Mandatory human participation: a new authentication scheme for building secure systems
Author :
Xu, Jun ; Lipton, Richard ; Essa, Irfan ; Sung, Minho ; Zhu, Yong
Author_Institution :
Coll. of Comput., Georgia Inst. of Technol., Atlanta, GA, USA
Abstract :
Mandatory human participation (MHP) is a novel authentication scheme that asks the question "are you human?" (Instead of "who are you?"), and upon the correct answer to this question, can prove a principal to be a human being instead of a computer program. MHP helps solve old and new problems in computer security that existing security measures cannot address properly, including password (or PIN number) guessing attacks and application-level denial of service. A key component of this "are you human?" authentication process is a character morphing algorithm that transforms a character string into its graphical form in such a way that a human being won\´t have any problem recognizing the original string, while a computer program (e.g., an optical character recognition program), will not be able to decipher it or make a correct guess with nonnegligible probability. The basic idea of the MHP scheme is to ask an agent to recognize the string before its login attempts or transaction requests can be honored. Here a protocol is needed to send a puzzle to an agent, check if the answer supplied by the agent is correct, and most importantly make sure that the agent cannot cheat in the process. A number of system and security issues that relate to the protocol need to be addressed for the protocol to be secure, efficient, robust, and user-friendly. The MHP scheme contributes to the foundation of the computer security by faithfully implementing novel security semantics, "human," which existing cryptographic measures cannot express accurately. As many real-world security applications involve the interaction between a human and a computer, which naturally contains "human" as a part of its protocol semantics, we believe that the MHP scheme will find many new applications in the future.
Keywords :
artificial intelligence; authorisation; complete computer programs; computer networks; message authentication; optical character recognition; public key cryptography; MHP; administration protocol; artificial intelligence; authentication scheme; character morphing algorithm; character string recognition; computer security; key component; mandatory human participation; Application software; Authentication; Character recognition; Computer crime; Computer security; Cryptographic protocols; Humans; Optical character recognition software; Optical computing; Robustness;
Conference_Titel :
Computer Communications and Networks, 2003. ICCCN 2003. Proceedings. The 12th International Conference on
Print_ISBN :
0-7803-7945-4
DOI :
10.1109/ICCCN.2003.1284222