Explore chapters and articles related to this topic
High-Performance Switch/Routers
Published in James Aweya, Designing Switch/Routers, 2023
Unlike in password authentication, identity checking in public key authentication is stronger. In password authentication, knowing only the user password is sufficient. Public key authentication requires the client (user) to know both the passphrase and the private key. The dependency of public key authentication on two separate elements (the passphrase and the private key) to ensure stronger security is referred to as two-factor authentication. Password authentication depends only on the password and is only a one-factor authentication scheme. In both methods, however, security still relies on correct identity establishment. If the wrong person gets a password, or if the wrong public key is associated with a user account, the strength of the identity checking will not prevent unauthorized users from accessing the system. If the private keys cannot be securely protected, then security with public key authentication is no better than with password authentication.
Identification and Entity Authentication
Published in Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, Handbook of Applied Cryptography, 2018
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
To allow greater entropy without stepping beyond the memory capacity of human users, passwords may be extended to passphrases; in this case, the user types in a phrase or sentence rather than a short “word”. The passphrase is hashed down to a fixed-size value, which plays the same role as a password; here, it is important that the passphrase is not simply truncated by the system, as passwords are in some systems. The idea is that users can remember phrases easier than random character sequences. If passwords resemble English text, then since each character contains only about 1.5 bits of entropy (Fact 7.67), a passphrase provides greater security through increased entropy than a short password. One drawback is the additional typing requirement.
Rain Drop Service and Biometric Verification Based Blockchain Technology for Securing the Bank Transactions from Cyber Crimes Using Weighted Fair Blockchain (WFB) Algorithm
Published in Cybernetics and Systems, 2023
The top part of Cybercrime consists of hacking and data fraud. Banks are becoming recognized as all the customer’s cash is held with banks. The customers’ safety is an ample opportunity because it has grown to be something but hard to hack the very own database. The preferred methods and tools may be used to identify a customer who carries out an online (remote/distant) transaction. It includes Authentication by using login ID, password, passphrase, security code, knowledge-based authentication (security questions in both shared secret or dynamic); something the user has, such as a security token, smart card, key fob, etc. One-time password delivered by SMS (Hazari and Mahmoud 2020), Electronic/digital signature. The connection of a financial system to the Internet for providing remote (online/distant) services to customers enable cybercriminals to interfere with the operation of banking and other payment systems. The most serious threats posed by cybercriminals to remote banking systems include theft or alteration (deletion) of banking information or personal data; malware infection of banking systems; disabling remote banking systems by sending bulk messages through botnets (networks of infected computers). There are many cybercrime-related vulnerabilities, including, among other things, the use of malware for stealing customer information stored with credit institutions, intellectual property, technologies, etc.
Leveraging the power of quantum computing for breaking RSA encryption
Published in Cyber-Physical Systems, 2021
Moolchand Sharma, Vikas Choudhary, R. S. Bhatia, Sahil Malik, Anshuman Raina, Harshit Khandelwal
Asymmetric Encryption Schemes are extremely useful and popular since they are very versatile. The availability of options while choosing the mode and stage of transfer makes it a go-to option for many. They do not require the communicating parties to have a beforehand agreed to passphrase, unlike symmetric-key cryptography. Unlike its counterpart, encryption and decryption with the same key cannot be done.
Securing personal data in public cloud
Published in Journal of Information and Telecommunication, 2020
Péter Vörös, Dániel Csubák, Péter Hudoba, Attila Kiss
The method is really easily portable because the encryption can be transferred with copying the passphrase to another machine. Cross-platform support is guaranteed because all major browsers allow JavaScript execution. Also Tampermonkey, the userscript manager that we use to inject our scripts, is compiled for Firefox, Chrome, Opera, Microsoft Edge.