Authentication model based on reformation mapping method

Sohail Safdar*, Mohd Fadzil Hassan, Muhammad Aasim Qureshi, Rehan Akbar, Rizwan Aamir

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The main objective of the research is to propose an authentication model that exhibits the authentication in more secured fashion. The proposed authentication model is based on the reformation mapping method and works in two stages. Firstly, it reforms the user created password and stored it in the form other than its original form. Depending on the nature of the password i.e. linear or two dimensional, this reformation can be performed by rotation or shuffle techniques. Secondly, the reformation can be applied either to the user entered password or to the stored password at the time of authentication. This reformation ensures that the user entered password can be mapped appropriately with the stored password. The possible application of the proposed model is discussed using linear passwords and two dimensional nxn passwords. The proposed authentication model improves the security of the password by reforming its original form and hiding it from the hackers.

Original languageEnglish
Title of host publicationProceedings of the 2010 International Conference on Information and Emerging Technologies, ICIET 2010
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781424480036
ISBN (Print)9781424480012
DOIs
Publication statusPublished - 9 Nov 2010
Event2nd International Conference on Information and Emerging Technologies, ICIET 2010 - Karachi, Pakistan
Duration: 14 Jun 201016 Jun 2010

Conference

Conference2nd International Conference on Information and Emerging Technologies, ICIET 2010
Country/TerritoryPakistan
CityKarachi
Period14/06/1016/06/10

Keywords

  • nxn password
  • reformation mapping method
  • rotation
  • shuffle

Fingerprint

Dive into the research topics of 'Authentication model based on reformation mapping method'. Together they form a unique fingerprint.

Cite this