Authentication Model Based on Reformation Mapping Method

Safdar, S. and Hassan, M.F. and Qureshi, M.A. and Akhbar, R. and Aamir, R. (2010) Authentication Model Based on Reformation Mapping Method. In: International Conference on Information and Emerging Technologies (ICIET 2010), 14-16 June 2010 , Karachi, Pakistan.

[thumbnail of stamp.jsp?tp=&arnumber=5625708&tag=1] PDF
stamp.jsp?tp=&arnumber=5625708&tag=1 - Published Version
Restricted to Registered users only

Download (298B)
Official URL: http://ieeexplore.ieee.org/search/srchabstract.jsp...

Abstract

The main objective of the research is to propose an authentication model that exhibits the authentication in more secured fashion. The proposed authentication model is based on the reformation mapping method and works in two stages. Firstly, it reforms the user created password and stored it in the form other than its original form. Depending on the nature of the password i.e. linear or two dimensional, this reformation can be performed by rotation or shuffle techniques. Secondly, the reformation can be applied either to the user entered password or to the stored password at the time of authentication. This reformation ensures that the user entered password can be mapped appropriately with the stored password. The possible application of the proposed model is discussed using linear passwords and two dimensional nxn passwords. The proposed authentication model improves the security of the password by reforming its original form and hiding it from the hackers.

Item Type: Conference or Workshop Item (Paper)
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Q Science > QA Mathematics > QA76 Computer software
Departments / MOR / COE: Departments > Computer Information Sciences
Depositing User: Dr Mohd Fadzil Hassan
Date Deposited: 18 Nov 2010 00:50
Last Modified: 19 Jan 2017 08:24
URI: http://scholars.utp.edu.my/id/eprint/3272

Actions (login required)

View Item
View Item