Javascript must be enabled to continue!
Cyber and Physical Access Control in Legacy System Using Passwords
View through CrossRef
Passwords—secret combinations of symbols—play an important role in physical world security (e.g. watchword to prevent unauthorized entry into military forbidden area) from ancient times. With emergence and advance of digital computers and computer network, passwords are also widely adopted in cyber world security protection. In most applications, password protection stands on the frontier of cyber/physical security defense. Compromise of passwords might render the whole system insecure, and make thereafter sophisticated cryptography solution ineffective. However, secure management of a large number of random passwords is a great challenge to human brains. We propose a visual cryptography technique, which allows users to store and manage ciphertexts of randomly chosen passwords in mobile phone and decrypt them manually on demand. The stored passwords remain confidential, even if the mobile phone is infected by spyware (Assume the spyware can capture phone screen, and monitor phone CPU and RAM). We also analyze the security and feasibility of proposed method. Leveraging on this technique, we give a simple access control system based on passwords, which provides a low cost alternative solution for legacy system besides smart card based solution.
Title: Cyber and Physical Access Control in Legacy System Using Passwords
Description:
Passwords—secret combinations of symbols—play an important role in physical world security (e.
g.
watchword to prevent unauthorized entry into military forbidden area) from ancient times.
With emergence and advance of digital computers and computer network, passwords are also widely adopted in cyber world security protection.
In most applications, password protection stands on the frontier of cyber/physical security defense.
Compromise of passwords might render the whole system insecure, and make thereafter sophisticated cryptography solution ineffective.
However, secure management of a large number of random passwords is a great challenge to human brains.
We propose a visual cryptography technique, which allows users to store and manage ciphertexts of randomly chosen passwords in mobile phone and decrypt them manually on demand.
The stored passwords remain confidential, even if the mobile phone is infected by spyware (Assume the spyware can capture phone screen, and monitor phone CPU and RAM).
We also analyze the security and feasibility of proposed method.
Leveraging on this technique, we give a simple access control system based on passwords, which provides a low cost alternative solution for legacy system besides smart card based solution.
Related Results
An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Abstract
The Physical Activity Guidelines for Americans (Guidelines) advises older adults to be as active as possible. Yet, despite the well documented benefits of physical a...
How to Protect Your Passwords and Secret Personal Notes
How to Protect Your Passwords and Secret Personal Notes
Many people think of using passwords for their data security, but few of them think about how to protect their passwords. The passwords we use also need to be protected. While crea...
THE EVOLUTION OF CYBER RESILIENCE FRAMEWORKS IN NETWORK SECURITY: A CONCEPTUAL ANALYSIS
THE EVOLUTION OF CYBER RESILIENCE FRAMEWORKS IN NETWORK SECURITY: A CONCEPTUAL ANALYSIS
The Evolution of Cyber Resilience Frameworks in Network Security: A Conceptual Analysis provides a comprehensive overview of the development and application of cyber resilience fra...
Cyber Espionage
Cyber Espionage
Cyberspace gives rise to risks as well as opportunities, and a prominent threat emerging from this domain is cyber espionage. Because no internationally and legally recognized defi...
Cyber operational risk scenarios for insurance companies
Cyber operational risk scenarios for insurance companies
Abstract
Cyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and ...
EFEKTIFITAS CYBER EXTENSION PADA PENYULUH AGAMA DI KOTA SEMARANG
EFEKTIFITAS CYBER EXTENSION PADA PENYULUH AGAMA DI KOTA SEMARANG
Abstrak
Artikel ini menyajikan hasil pelaksanaan cyber extension yang dilaksanakan oleh penyuluh agama Kota Semarang, serta efektifitas dari pelaksanaannya. Cyber extension ...
Usability Study on Textual and Graphical Passwords
Usability Study on Textual and Graphical Passwords
One of the most common methods used for authentication are passwords, in particular textual passwords. However, maintaining multiple textual passwords across various websites or in...

