scispace - formally typeset
Proceedings ArticleDOI

Multi-layered crypto cloud integration of oPass

Reads0
Chats0
TLDR
A protocol is proposed based on oPass to implement multi-layer crypto-cloud integration with oPass which can handle Impersonation of the User attack.
Abstract
One of the most popular forms of user authentication is the Text Passwords. It is due to its convenience and simplicity. Still, the passwords are susceptible to be taken and compromised under various threats and weaknesses. In order to overcome these problems, a protocol called oPass was proposed. A cryptanalysis of it was done. We found out four kinds of attacks which could be done on it i.e. Use of SMS service, Attacks on oPass communication links, Unauthorized intruder access using the master password, Network attacks on untrusted web browser. One of them was Impersonation of the User. In order to overcome these problems in cloud environment, a protocol is proposed based on oPass to implement multi-layer crypto-cloud integration with oPass which can handle this kind of attack.

read more

Citations
More filters
References
More filters
Book

Cryiptography and Network Security : Principles and Practices, 3rd ed

TL;DR: In this article, the authors present a survey of the most popular methods for teaching creativity in the field of cryptography and apply them in the context of public-key cryptography and RSA.
Journal ArticleDOI

oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks

TL;DR: A user authentication protocol named oPass is designed which leverages a user's cellphone and short message service to thwart password stealing and password reuse attacks and is believed to be efficient and affordable compared with the conventional web authentication mechanisms.
Proceedings ArticleDOI

A Pseudo Random Number Generator in Mobile Agent Interactions

TL;DR: The proposed approach uses Java garbage collector data to generate the key of the polymorphic encryption and decryption (PED) encryption algorithm, which has high entropy and hashes of the garbage collector outputs are unique.
Related Papers (5)