IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 6 - Issue 6, June 2017 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Multimodal Authentication - Biometric, Password, And Steganography

[Full Text]

 

AUTHOR(S)

Alvin Prasad, Mohammed Farik

 

KEYWORDS

Authentication, Biometric, Cryptography, Kerberos, Password attack, Steganography

 

ABSTRACT

Security is a major concern for everyone, be it individuals or organizations. As the nature of information systems is becoming distributed, securing them is becoming difficult as well. New applications are developed by researchers and developers to counter security issues but as soon as the application is released new attacks are formed to bypass the application. Kerberos is an authentication protocol which helps in to verify and validate a user to a server. As it is a widely used protocol minimizing or preventing the password attack is important. In this research we have analyzed the Kerberos protocol and suggested some ideas which can be considered while updating Kerberos to prevent the password attack. In the proposed solution we are suggesting to use password and biometric technique while registering on the network to enjoy the services and a combination of cryptography and steganography technique while communicating back to the user.

 

REFERENCES

R. N. Rose, “The Future Of Insider Threats,” 30 August 2016. [Online]. Available: https://www.forbes.com/sites/realspin/2016/08/30/the-future-of-insider-threats/#7f6c4fb17dcb.

[2]. E. Barker and A. Roginsky, “Recommendation for Cryptographic Key Generation,” National Institute of Standards and Technology, 2012.

[3]. W. Stallings, Network Security Essentials: Application and Standards, USA: Prentice Hall, 2011.

[4]. Techtarget network, “Kerberos,” 31 August 2016. [Online]. Available: http://searchsecurity.techtarget.com/definition/Kerberos. [Accessed 29 March 2017].

[5]. J. T. Kohl, B. C. Neuman and T. Y. Ts’o, “The Evolution of the Kerberos Authentication Service,” in European Conference on Open Systems, Norway, 1991.

[6]. Massachusetts Institute of Technology, “Kerberos: The Network Authentication Protocol,” 3 March 2017. [Online]. Available: https://web.mit.edu/kerberos/. [Accessed 23 April 2017].

[7]. S. M. Bellovin and M. Merritt, “Limitations of the Kerberos Authentication system,” Computer Communications Review, pp. 119-132, 1990.

[8]. T. Wu, “A Real-World Analysis of Kerberos Password Security,” 1999.

[9]. G. Dua, N. Gautam, D. Sharma and A. Arora, “Replay attack prevention in Kerberos authentication protocol using triple password,” International Journal of Computer Networks & Communications, pp. 59-70, 2013.

[10]. J. Yang, “An Improved Scheme of Single Sign-on Protocol,” in Fifth International Conference on Information Assurance and Security, 2009.

[11]. Y.-y. Du, H.-y. Ning, P. Yang and Y.-x. Cui, “Improvement of Kerberos protocol based on dynamic password and “One-time public key”,” in 10th International Conference on Natural Computation (ICNC), 2014.

[12]. A. Jesudoss and N. Subramaniam, “Enhanced Kerberos authentication for distributed environment,” Journal of Theoretical and Applied Information Technology, pp. 368-374, 2014.

[13]. R. Hegde, “Biometric authentication technique with Kerberos for email login,” International Journal of Advances in Engineering & Technology, pp. 1735-1744, 2015.

[14]. Q. Le, H. P. Truong, H. T. Van and T. H. Le, “A new pre-authentication protocol in Kerberos 5: biometric authentication,” in 2015 IEEE RIVF International Conference on Computing & Communication Technologies - Research, Innovation, and Vision for the Future (RIVF), 2015.

[15]. T. Thakur, S. Dogra and Y. Sood, “Replay Attack Prevention by Using a Key with Random Number in Kerberos Authentication protocol,” International Journal of Innovative Research in Science, Engineering and Technology, pp. 5616-5622, 2015.

[16]. W. Lei, H. Cao, X. Liang and H. Zhang, “An Improved Kerberos Scheme Based on dynamic password,” I.J. Information Technology and Computer Science, pp. 33-39, 2010.

[17]. D. Winder, “Top ten password cracking techniques,” 2 December 2011. [Online]. Available: http://www.alphr.com/features/371158/top-ten-password-cracking-techniques. [Accessed 24 May 2017].

[18]. F. M. Shelke, A. A. Dongre and P. D. Soni, “Comparison of different techniques for Steganography in images,” International Journal of Application or Innovation in Engineering & Management (IJAIEM), pp. 171-176, 2014.

[19]. Learn Cryptography, “What is Steganography?,” 2017. [Online]. Available: https://learncryptography.com/steganography/what-is-steganography. [Accessed 23 4 2017].

[20]. M. Hussain and M. Hussain, “A Survey of Image Steganography Techniques,” International Journal of Advanced Science and Technology, pp. 113-123, 2013.

[21]. N. F. Johnson and S. C. Katzenbeisser, “A Survey of Steganographic Techniques,” in Information Hiding, Darmstadt, Springer International Publishing, 2009, pp. 43-78.

[22]. P. Rai, S. Gurung and M. K. Ghose, “Analysis of Image Steganography Techniques: A Survey,” International Journal of Computer Applications, pp. 11-17, 2015.

[23]. H. V. Desai, “Steganography, Cryptography, Watermarking: A Comparative Study,” Journal of Global Research in Computer Science, pp. 33-35, 2012.

[24]. A. J. Raphael and V. Sundaram, “Cryptography and Steganography – A Survey,” Int. J. Comp. Tech. Appl, pp. 626-630, 2011.

[25]. D. Bloisi and L. Iocchi, “Image based steganography and cryptography,” International conf. on computer vision theory and applications, 2007.

[26]. V. Matyas and Z. Riha, “Biometric authentication - security and usability,” in 6th Joint working conference on communications and multimedia security, Deventer , 2002.