An authentication model based on cryptography

by   Ibrahim Obeidat, et al.

In this paper we proposed an authentication technique based on the user cards, to improve the authentication process in systems that allows remote access for the users, and raise the security rate during an exchange of their messages. in this technique the server performs two functions, the first function, register the users, and give him user ID, PIN code, and user private card contains secrecy information, which is used to encrypt user messages by using two kinds of encryption symmetric using RC4-Pr and asymmetric using RSA encryption., the second function, distribute the user's public card if the user demand that, in which the user sends the own authentication code with their own user ID and recipient user ID to the authentication check, and then the server sends the user public card to the recipient user, thus the sender user can send the messages to recipient user without back to the server again. We attained confidentiality using RC4-Pr and RSA encryption and message authentication, user signature, and mutual secret key by using RSA encryption. in this paper we also implement the proposal in [1] RC4-pr algorithm which is modified to improve the key weakness of basic RC4.



page 3


Image Authentication using Visual Cryptography

This report gives a novel technique of image encryption and authenticati...

Secure Encryption scheme with key exchange for Two server Architecture

In the distributed environment, authentication and key exchange mechanis...

Password-authenticated Decentralized Identities

Password-authenticated identities, where users establish username-passwo...

Zero Knowledge Proof based authentication protocol using graph isomorphism

We live in an era of information and it is very important to handle the ...

A Proposed Access Control-Based Privacy Preservation Model to Share Healthcare Data in Cloud

Healthcare data in cloud computing facilitates the treatment of patients...

Serverless Electronic Mail

We describe a simple approach to peer-to-peer electronic mail that would...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.