Javascript must be enabled to continue!
Web-based User Authentication and Access Control: An Enhanced Multi-Factor Biometric Cryptographic Scheme Based on Client File and S13 Quantum Key Distribution Protocol
View through CrossRef
Several remote user authentication schemes have been proposed using external memory and smart cards. Smart card-based schemes have user mobility and deployment problems, and those based on external memory have a tamper resistance problem. Although Cherbal and Benchetioui’s scheme solved remote authentication problems using Elliptical Curve Cryptography and 2-Factor authentication, they still have not addressed key distribution, perfect forward secrecy, and session hijacking issues. This research proposes an enhanced multi-factor authentication and access control scheme based on the S13 quantum key distribution protocol, using a client file in an external memory. The proposed scheme combines the powers of an enhanced quantum key distribution, a lightweight tamper-resistance client file, and biometrics to overcome these limitations. The security of the proposed scheme was verified, validated, and evaluated against the reviewed scheme using various tools. The AVISPA simulation results showed that the proposed scheme is validated, secure against session hijacking, has a secure key distribution policy, and ensures perfect forward secrecy. The security functionalities analysis shows that the proposed scheme has the highest security index of 13 and is the only scheme that used the tamper-resistance client file in an external memory for the first time. The performance evaluation results showed that the proposed scheme is more efficient than the reviewed scheme with a computation cost of 0.83125s and 0.25902s and a percentage improvement of 48.48% and 73.98% for the respective user and server and a more efficient communication costs of 2112 bits than the reviewed scheme with a percentage improvement of 16.46%.
Title: Web-based User Authentication and Access Control: An Enhanced Multi-Factor Biometric Cryptographic Scheme Based on Client File and S13 Quantum Key Distribution Protocol
Description:
Several remote user authentication schemes have been proposed using external memory and smart cards.
Smart card-based schemes have user mobility and deployment problems, and those based on external memory have a tamper resistance problem.
Although Cherbal and Benchetioui’s scheme solved remote authentication problems using Elliptical Curve Cryptography and 2-Factor authentication, they still have not addressed key distribution, perfect forward secrecy, and session hijacking issues.
This research proposes an enhanced multi-factor authentication and access control scheme based on the S13 quantum key distribution protocol, using a client file in an external memory.
The proposed scheme combines the powers of an enhanced quantum key distribution, a lightweight tamper-resistance client file, and biometrics to overcome these limitations.
The security of the proposed scheme was verified, validated, and evaluated against the reviewed scheme using various tools.
The AVISPA simulation results showed that the proposed scheme is validated, secure against session hijacking, has a secure key distribution policy, and ensures perfect forward secrecy.
The security functionalities analysis shows that the proposed scheme has the highest security index of 13 and is the only scheme that used the tamper-resistance client file in an external memory for the first time.
The performance evaluation results showed that the proposed scheme is more efficient than the reviewed scheme with a computation cost of 0.
83125s and 0.
25902s and a percentage improvement of 48.
48% and 73.
98% for the respective user and server and a more efficient communication costs of 2112 bits than the reviewed scheme with a percentage improvement of 16.
46%.
Related Results
A KCP-DCNN-Based Two-Step Verification Multimodal Biometric Authentication System featuring QR Code Fabrication
A KCP-DCNN-Based Two-Step Verification Multimodal Biometric Authentication System featuring QR Code Fabrication
Abstract
Starting with for, need change Enhanced authentication performance, the concept of multi-biometrics authentication systems has emerged as a promising solution in t...
Advanced frameworks for fraud detection leveraging quantum machine learning and data science in fintech ecosystems
Advanced frameworks for fraud detection leveraging quantum machine learning and data science in fintech ecosystems
The rapid expansion of the fintech sector has brought with it an increasing demand for robust and sophisticated fraud detection systems capable of managing large volumes of financi...
Quantum Cryptographic Primitives
Quantum Cryptographic Primitives
The main motivation of this thesis is the uncertain panorama of cybersecurity risks and threats, accentuated by the arrival of the quantum computer. This type of computer is comple...
Lacibacter sediminis sp. nov., isolated from contaminated freshwater sediment
Lacibacter sediminis sp. nov., isolated from contaminated freshwater sediment
Two Gram-stain-negative bacterial strains, S13-6-6 and S13-6-22T, were isolated from sediment sample collected at a water depth of 4 m from Lake Hongze, Jiangsu Province, PR China....
A Comprehensive Review of Multi-BiometricAuthentication System: Optimal Trait Combinations, Fusion Strategy, Methodologies, Research Challenges, and Future Directions
A Comprehensive Review of Multi-BiometricAuthentication System: Optimal Trait Combinations, Fusion Strategy, Methodologies, Research Challenges, and Future Directions
Abstract
Multi-biometric authentication is increasingly favored over single-biometric systems due to its enhanced robustness, performance, and security. Over the years, ext...
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
The paper objective is to determine the basic schemes and their characteristics for ensuring the security of Internet of Things nodes using symmetric authentication cryptographic m...
Biometric Encryption: Integrating Artificial Intelligence for Robust Authentication
Biometric Encryption: Integrating Artificial Intelligence for Robust Authentication
Biometric authentication, leveraging unique physiological or behavioral traits for identity verification, has emerged as a cornerstone of contemporary security systems. However, th...

