An Authentication Scheme Based on Chaos, a TTP, and a DNA Sequence
[1]
Ralph M. DeFrangesco, Drexel University, College of Computing and Informatics, Philadelphia, PA. 19104 USA.
As individuals, we count on authentication to protect the systems that store our most important information on. Critical systems include medical, financial, and systems that run our nation’s infrastructure. This paper will discuss how chaos can be used in conjunction with a TTP and a DNA sequence to create a onetime credential that can be used to authenticate to a system.
[1]
Jingbo, Y. & Pingping, S. (2010) A secure strong password authentication protocol. Second International Conference on Software Technology and Engineering, pgs 355-357.
[2]
Katz, J., & Lindell, Y. (2008). Introduction to modern cryptography. Chapman and Hall: Boca Raton, FL.
[3]
Lakshmiraghavan, B. (2013). Two-factor authentication. In Pro ASP. NET Web API Security (pp. 319-343). Apress.
[4]
Li, Q., Wu, K. & Li, F. (2013) An optimistic non-repudiation protocol focused on transparent trusted third party IEEE Conference on High Performance Computing and Communications, pgs 682-689.
[5]
Liu, D., & Coslow, M. (2008), Extensible authentication protocols for IEEE standards 802.11 and 802.16. The International Conference on Mobile Technology, Applications & Systems. September 10-12, 2008
[6]
Ma, X., McCrindle, R. & Cheng, X. (2006). Verifying and fixing password authentication Protocol. Proceedings of the Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel Distributed Computing.
[7]
Muhammad, S (2013) Applying authentication tests to discover man-in-the-middle attack in security protocols. Eighth Conference on Digital Information Management, pgs 35-40.
[8]
Poznyakoff, S. (2008) GNU Radius Reference Manual. GNU Press. Boston, MA.
[9]
Sood, S, Sarje, A. & Singh, K. (2009) Cryptanalysis of password authentication schemes: Current status and key issues. International Conference on Methods and Models in Computer Science.
[10]
Wang, C. & Feng, C. (2013) Security analysis and improvement for Kerberos based bynamic password and Diffie-Hellman algorithm. Fourth International Conference on Emerging Intelligent Data and Web Technologies, pgs 256-260.