Two dimensional password based hybrid authentication methods in vulnerable workflows

Sohail Safdar*, Mohd Fadzil Hassan

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The main objective of the research is to propose the hybrid methods for secure authentication methods using two-dimensional nxn passwords. When an intrusion attack strikes the system then its services have to be truncated and system become unavailable temporarily. To make the system available to the end user in the vulnerable state, the specialized access control should be in place. Therefore, specialized and secure authentication methods are required. Authenticating through these methods, users can become active again to the system and considered as safe. The long and complex nxn passwords are used and considered to be very useful in certain alarming situations such as the system being under threat. Proposed hybrid methods works on the two portions of the password that is server generated part and user created part and ensure the secure authentication to the system resources that is under threat. Proposed methods are classified on the basis of symmetrical displacement of server generated part and user created part of the password. The strength and limitations of all the proposed methods have also been analyzed.

Original languageEnglish
Title of host publicationProceedings of the 2012 International Conference on Computer and Information Science, ICCIS 2012 - A Conference of World Engineering, Science and Technology Congress, ESTCON 2012 - Conference Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages908-913
Number of pages6
Volume2
ISBN (Electronic)9781467319386
ISBN (Print)9781467319379
DOIs
Publication statusPublished - 10 Sept 2012
Event2012 International Conference on Computer and Information Science, ICCIS 2012 - A Conference of World Engineering, Science and Technology Congress, ESTCON 2012 - Kuala Lumpur, Malaysia
Duration: 12 Jun 201214 Jun 2012

Conference

Conference2012 International Conference on Computer and Information Science, ICCIS 2012 - A Conference of World Engineering, Science and Technology Congress, ESTCON 2012
Country/TerritoryMalaysia
CityKuala Lumpur
Period12/06/1214/06/12

Keywords

  • Bit Entropy
  • NIST
  • nxn password
  • rotational reformation

Fingerprint

Dive into the research topics of 'Two dimensional password based hybrid authentication methods in vulnerable workflows'. Together they form a unique fingerprint.

Cite this