Faculty Publications

Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736

Publications by NITK Faculty

Browse

Search Results

Now showing 1 - 2 of 2
  • Item
    Remote User Authentication and Issues: A Survey
    (Institute of Electrical and Electronics Engineers Inc., 2020) Mehra, R.; Meshram, A.; Chandavarkar, B.R.
    The most convenient and the simplest authentication method to deal with the important and secret data over an uncertain network is remote user authentication. For remote user authentication, a system call with a high-security network is required, which will help to identify whether the parties which are communicating are trustworthy and genuine. User and the server will be securely authenticated using remote user authentication, protecting and processing the communication in a user-friendly way, and provide security to the user by hiding their details. This paper discusses the different approaches in which a remote user authentication mechanism can be done and the issues in those methods, which will verify both the parties in a secure, simple, and convenient way. © 2020 IEEE.
  • Item
    An Experimental Evaluation on the Dependency between One-Way Hash Functions and Salt
    (Institute of Electrical and Electronics Engineers Inc., 2020) Rathod, U.; Sonkar, M.; Chandavarkar, B.R.
    Passwords are barriers that protect unauthorized users from accessing personal information in any application. Protecting passwords is one of the challenging tasks in today's world. Currently, a combination of Username/Password used for authentication for a large number of applications. Malicious users might try to steal/misuse the user's data for unethical purposes. To prevent passwords from stealing, developers prefer to use one-way hash functions. One-way hash functions are theoretically irreversible functions that take as an input variable size text and output fixed-sized text. In reality, hash functions are not collision-resistant. Therefore it is recommended to use passwords and randomly generated text called salt to generate hash values and prevent rainbow tables and dictionary attacks. Passwords are hashed at the client-side and sent across the public channel/network. A salt is a randomly generated alphanumeric text used to concatenate with a password to generate a random hash value. This paper demonstrates how the random generation of salt is dependent on passwords and how hash values are dependent on salt. Further, analysis of the behaviour of passwords and hash values using various tools like Wireshark, Ettercap, and Hydra are presented in the paper. © 2020 IEEE.