Welcome to Open Science
Contact Us
Home Books Journals Submission Open Science Join Us News
An Authentication Scheme Based on Chaos, a TTP, and a DNA Sequence
Current Issue
Volume 1, 2014
Issue 5 (November)
Pages: 39-42   |   Vol. 1, No. 5, November 2014   |   Follow on         
Paper in PDF Downloads: 23   Since Aug. 28, 2015 Views: 1622   Since Aug. 28, 2015
Authors
[1]
Ralph M. DeFrangesco, Drexel University, College of Computing and Informatics, Philadelphia, PA. 19104 USA.
Abstract
As individuals, we count on authentication to protect the systems that store our most important information on. Critical systems include medical, financial, and systems that run our nation’s infrastructure. This paper will discuss how chaos can be used in conjunction with a TTP and a DNA sequence to create a onetime credential that can be used to authenticate to a system.
Keywords
Chaos, TTP, Non-Linear Dynamics
Reference
[1]
Jingbo, Y. & Pingping, S. (2010) A secure strong password authentication protocol. Second International Conference on Software Technology and Engineering, pgs 355-357.
[2]
Katz, J., & Lindell, Y. (2008). Introduction to modern cryptography. Chapman and Hall: Boca Raton, FL.
[3]
Lakshmiraghavan, B. (2013). Two-factor authentication. In Pro ASP. NET Web API Security (pp. 319-343). Apress.
[4]
Li, Q., Wu, K. & Li, F. (2013) An optimistic non-repudiation protocol focused on transparent trusted third party IEEE Conference on High Performance Computing and Communications, pgs 682-689.
[5]
Liu, D., & Coslow, M. (2008), Extensible authentication protocols for IEEE standards 802.11 and 802.16. The International Conference on Mobile Technology, Applications & Systems. September 10-12, 2008
[6]
Ma, X., McCrindle, R. & Cheng, X. (2006). Verifying and fixing password authentication Protocol. Proceedings of the Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel Distributed Computing.
[7]
Muhammad, S (2013) Applying authentication tests to discover man-in-the-middle attack in security protocols. Eighth Conference on Digital Information Management, pgs 35-40.
[8]
Poznyakoff, S. (2008) GNU Radius Reference Manual. GNU Press. Boston, MA.
[9]
Sood, S, Sarje, A. & Singh, K. (2009) Cryptanalysis of password authentication schemes: Current status and key issues. International Conference on Methods and Models in Computer Science.
[10]
Wang, C. & Feng, C. (2013) Security analysis and improvement for Kerberos based bynamic password and Diffie-Hellman algorithm. Fourth International Conference on Emerging Intelligent Data and Web Technologies, pgs 256-260.
Open Science Scholarly Journals
Open Science is a peer-reviewed platform, the journals of which cover a wide range of academic disciplines and serve the world's research and scholarly communities. Upon acceptance, Open Science Journals will be immediately and permanently free for everyone to read and download.
CONTACT US
Office Address:
228 Park Ave., S#45956, New York, NY 10003
Phone: +(001)(347)535 0661
E-mail:
LET'S GET IN TOUCH
Name
E-mail
Subject
Message
SEND MASSAGE
Copyright © 2013-, Open Science Publishers - All Rights Reserved