Skip to main navigation Skip to search Skip to main content

Infinite alphabet passwords-a unified model for a class of authentication systems

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Downloads (Pure)

Abstract

In the paper we propose a formal model for class of authentication systems termed, “Infinite Alphabet Password Systems” (IAPs). We define such systems as those that use a character set for the construction of the authentication token that is theoretically infinite, only bound by practical implementation restrictions. We find that the IAP architecture can feasibly be adapted for use in many real world situations, and may be implemented using a number of system architectures and cryptographic protocols. A security analysis is conducted on an implementation of the model that utilizes images for its underlying alphabet. As a result of the analysis we find that IAPs can offer security benefits over traditional alphanumeric password schemes. In particular some of the significant problems concerning phishing, pharming, replay, dictionary and offline brute force attacks are mitigated.
Original languageEnglish
Title of host publicationProceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
PublisherSciTePress
Pages94-99
ISBN (Electronic)978-989-8425-18-8
DOIs
Publication statusPublished - 5 Apr 2011
Event2010 International Conference on Security and Cryptography (SECRYPT) - Athens
Duration: 26 Jul 201028 Jul 2010
http://ieeexplore.ieee.org/xpl/conhome/5738446/proceeding

Conference

Conference2010 International Conference on Security and Cryptography (SECRYPT)
CityAthens
Period26/07/1028/07/10
Other2010 International Conference on Security and Cryptography (SECRYPT) (26/07/2010-28/07/2010, Athens)
Internet address

Keywords

  • Mathematics
  • Passwords
  • authentication
  • modelling

Fingerprint

Dive into the research topics of 'Infinite alphabet passwords-a unified model for a class of authentication systems'. Together they form a unique fingerprint.

Cite this