Comparing passwords, tokens, and biometrics for user authentication
@article{OGorman2003ComparingPT, title={Comparing passwords, tokens, and biometrics for user authentication}, author={Lawrence O'Gorman}, journal={Proceedings of the IEEE}, year={2003}, volume={91}, pages={2019-2020} }
For decades, the password has been the standard means for user authentication on computers. [] Key Method Examples of authenticator combinations and protocols are described to show tradeoffs and solutions that meet chosen, practical requirements. The paper endeavors to offer a comprehensive picture of user authentication solutions for the purposes of evaluating options for use and identifying deficiencies requiring further research.
Figures and Tables from this paper
724 Citations
Proficient Implementation of oPass Client Authentication Protocol
- Computer Science
- 2018
The identity of the user will be authenticated through cellular phone which is used to generate a one-time session password, then transmit the encrypted message through short message service, and a more profound client verification is performed without uncovering watchword to the untrusted PCs.
Password based authentication: Philosophical survey
- Computer Science2010 IEEE International Conference on Intelligent Computing and Intelligent Systems
- 2010
This paper is giving authentication credential to various techniques which is used in password based authentication and giving the techniques for prevention of password attacks.
State based authentication
- Computer ScienceACM-SE 43
- 2005
A novel technique is presented that uses a State Based Authentication method to significantly increase the cost of brute-force and dictionary attack on passwords and has the potential to reduce thecost of password helpdesk significantly by eliminating the need of most password-reset requests.
A Secure and Practical Authentication Scheme Using Personal Devices
- Computer ScienceIEEE Access
- 2017
This paper proposes an efficient and practical user authentication scheme using personal devices that utilize different cryptographic primitives, such as encryption, digital signature, and hashing that not only is secure against password-related attacks, but also can resist replay attacks, shoulder-surfing attacks, phishing attacks, and data breach incidents.
Secure Password Management With Smart Cards
- Computer Science
- 2013
A password manager based on smart cards where the passwords are securely stored inside the smart card and can only be accessed after mutual authentication, eliminating the problem of brute force attacks.
A Novel Method for Graphical Password Mechanism
- Computer Science
- 2015
This paper describes and examines usability and security of graphical password mechanism for authentication using graphical passwords, describes characteristics for security and performed empirical study comparing Graphical password mechanism with Biometric passwords and alphanumeric password.
Fingerprint based authentication system with keystroke dynamics for realistic user
- Computer ScienceSecond International Conference on Current Trends In Engineering and Technology - ICCTET 2014
- 2014
This work presents a novel approach for user authentication based on fingerprint and the keystroke dynamics of the password entry, which is a multimodal biometrics authentication system.
Active One-Time Password Mechanism for User Authentication
- Computer ScienceGPC
- 2013
This manuscript proposes an active one-time password (AOTP) mechanism for user authentication to overcome two abovementioned problems, password stealing and reuse, utilizing cellphone and short message service and gives some comparison tables to present that the proposed mechanism is better than other similar works.
Protecting password piracy using authentication protocol
- Computer Science2013 International Conference on Information Communication and Embedded Systems (ICICES)
- 2013
An authentication protocol is proposed which requires a user's cellphone, an untrusted system, a telecommunication provider and a web server and here users have to remember only a long-term password for login to all websites.
References
SHOWING 1-10 OF 94 REFERENCES
Authentication: From Passwords to Public Keys
- Computer Science
- 2001
The first of its kind, Authentication describes the entire range of authentication methods used today, and examines situations in which certain techniques fail and points out ways to strengthen them.
Enhancing security and privacy in biometrics-based authentication systems
- Computer ScienceIBM Syst. J.
- 2001
The inherent strengths of biometrics-based authentication are outlined, the weak links in systems employing biometric authentication are identified, and new solutions for eliminating these weak links are presented.
The Secure Remote Password Protocol
- Computer Science, MathematicsNDSS
- 1998
This new protocol combines techniques of zero-knowledge proofs with asymmetric key exchange protocols and has significantly improved performance over comparably strong extended methods that resist stolen-veri er attacks such as Augmented EKE or B-SPEKE.
UNIX Password Security - Ten Years Later
- Computer ScienceCRYPTO
- 1989
It is concluded that the single most important step that can be taken to improve password security is to increase password entropy.
A survey of password mechanisms: Weaknesses and potential improvements. Part 2
- Computer ScienceComput. Secur.
- 1989
Protecting Poorly Chosen Secrets from Guessing Attacks
- Computer ScienceIEEE J. Sel. Areas Commun.
- 1993
The basic idea is to ensure that data available to the attacker is sufficiently unpredictable to prevent an offline verification of whether a guess is successful or not and to examine protocols to detect vulnerabilities to such attacks.
Encrypted key exchange: password-based protocols secure against dictionary attacks
- Computer Science, MathematicsProceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy
- 1992
A combination of asymmetric (public-key) and symmetric (secret- key) cryptography that allow two parties sharing a common password to exchange confidential and authenticated information over an insecure network is introduced.