Detailed Analysis and Redesign of Password Authentication Protocol
VerifiedAdded on 2022/10/01
|5
|806
|17
Discussion Board Post
AI Summary
This discussion post analyzes password-based authentication protocols, focusing on biometric authentication and its resistance to off-line dictionary attacks. The student examines the detailed protocol specification of biometric authentication, highlighting its use of physiological or behavioral characteristics for user identification and verification. The post contrasts biometric systems with traditional password-based systems, emphasizing that biometric systems, like those using fingerprint or voice recognition, are inherently more resistant to off-line dictionary attacks because they do not require password input. The student explores the potential of dual-layer security, combining password and certificate-based authentication, to fortify biometric systems against future threats and enhance overall security. The post includes references to relevant research and patents in the field.

Running head: PASSWORD AUTHENTICATION PROTOCOL
PASSWORD AUTHENTICATION PROTOCOL
Name of the Student:
Name of the University:
Author Note:
PASSWORD AUTHENTICATION PROTOCOL
Name of the Student:
Name of the University:
Author Note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1PASSWORD AUTHENTICATION PROTOCOL
Table of Contents
Detailed Protocol Specification..................................................................................................2
Off-line dictionary attack...........................................................................................................3
Redesigning of protocol.............................................................................................................3
References..................................................................................................................................4
Table of Contents
Detailed Protocol Specification..................................................................................................2
Off-line dictionary attack...........................................................................................................3
Redesigning of protocol.............................................................................................................3
References..................................................................................................................................4

2PASSWORD AUTHENTICATION PROTOCOL
Detailed Protocol Specification
Identification as well as authentication refers to a specific process that can be
particularly utilized to identify as well as verify all the users present within the dataset of the
secure system. In such secure systems, the user must be able to provide with a proper
identification of itself to that of the secure system, following which the system will put
forward the authentication of the identity and provision the user to use the system (Schultz
and Sartini, 2016). Within this process, the authentication is the protocol, which allows the
user to get the access to a system and use it.
Biometric Authentication refers to a digitalized measurement related to the
physiological or the behavioral characteristics of the humans. A system for the biometric
authentication can be typically utilized to distinguish one person from that of someone else
(Smith et al., 2015). The biometric system for authentication is of many types such as the
likes of face detection, fingerprint authentication, iris authentication as well as voice
authentication.
Fingerprint system of authentication makes use of a specific electronic device to take
a snapshot of the digital image belonging to that of the fingerprint pattern. The image
that has been captured is processed digitally to create a biometric template. This
template is stored for the future processes of authentication.
Voice authentication- this procedure for authentication makes use of the voice pattern
to recognize the specific identity of an individual. Hence, it is considered to be one of
the efficient methods of biometric authentication.
Face detection- this method of detection makes use of technology related learning
algorithms to specifically allocate the face of humans in the form of digital images.
Detailed Protocol Specification
Identification as well as authentication refers to a specific process that can be
particularly utilized to identify as well as verify all the users present within the dataset of the
secure system. In such secure systems, the user must be able to provide with a proper
identification of itself to that of the secure system, following which the system will put
forward the authentication of the identity and provision the user to use the system (Schultz
and Sartini, 2016). Within this process, the authentication is the protocol, which allows the
user to get the access to a system and use it.
Biometric Authentication refers to a digitalized measurement related to the
physiological or the behavioral characteristics of the humans. A system for the biometric
authentication can be typically utilized to distinguish one person from that of someone else
(Smith et al., 2015). The biometric system for authentication is of many types such as the
likes of face detection, fingerprint authentication, iris authentication as well as voice
authentication.
Fingerprint system of authentication makes use of a specific electronic device to take
a snapshot of the digital image belonging to that of the fingerprint pattern. The image
that has been captured is processed digitally to create a biometric template. This
template is stored for the future processes of authentication.
Voice authentication- this procedure for authentication makes use of the voice pattern
to recognize the specific identity of an individual. Hence, it is considered to be one of
the efficient methods of biometric authentication.
Face detection- this method of detection makes use of technology related learning
algorithms to specifically allocate the face of humans in the form of digital images.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3PASSWORD AUTHENTICATION PROTOCOL
Hence, in reference to future happenings, the individual is recognized from the digital
image that is stored.
Off-line dictionary attack
Off-line dictionary attacks makes use of every single alphabet existing within the
dictionary to input as a password into the authentication system to get the unauthorized
access to the systems. However, the biometric system for authentication has no requirement
to input or type special access keys or password into the system. This system only has the
requirement to scan special body parts of the humans to provision the individual with the
access into utilizing the system (Nelms, Shake and Lobo, 2019). As a reason of this, the Off-
line dictionary attacks do not specifically cause any kind of harm to the working of a
biometric authentication system.
Redesigning of protocol
In reference to this fast expanding digitalized global environment, hackers and the
other existing threats to an authentication system have been undergoing newer inventions in
the past decade. For this reasons, there lies no assurance with the biometric system of
authentication to be hacked by the measures of Off-line Dictionary (Farash, 2017). Hence, the
newly developed authentication systems shall be installed with dual layer of password
security as well as the certificate based authentication. By this Way, the individual who is
trying to enforce the measures of offline-dictionary attacks shall have to get past the
password system as well as the certificate based authentication system to deal with the
biometric system (Lindell and Pe'er, 2019). This ensures a greater measure of security for the
Biometry based system.
Hence, in reference to future happenings, the individual is recognized from the digital
image that is stored.
Off-line dictionary attack
Off-line dictionary attacks makes use of every single alphabet existing within the
dictionary to input as a password into the authentication system to get the unauthorized
access to the systems. However, the biometric system for authentication has no requirement
to input or type special access keys or password into the system. This system only has the
requirement to scan special body parts of the humans to provision the individual with the
access into utilizing the system (Nelms, Shake and Lobo, 2019). As a reason of this, the Off-
line dictionary attacks do not specifically cause any kind of harm to the working of a
biometric authentication system.
Redesigning of protocol
In reference to this fast expanding digitalized global environment, hackers and the
other existing threats to an authentication system have been undergoing newer inventions in
the past decade. For this reasons, there lies no assurance with the biometric system of
authentication to be hacked by the measures of Off-line Dictionary (Farash, 2017). Hence, the
newly developed authentication systems shall be installed with dual layer of password
security as well as the certificate based authentication. By this Way, the individual who is
trying to enforce the measures of offline-dictionary attacks shall have to get past the
password system as well as the certificate based authentication system to deal with the
biometric system (Lindell and Pe'er, 2019). This ensures a greater measure of security for the
Biometry based system.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4PASSWORD AUTHENTICATION PROTOCOL
References
Lindell, Y. and Pe'er, G., Unbound Tech Ltd and Bar-Ilan University, 2019. System and
method for authenticating a person using biometric data. U.S. Patent Application
15/979,822.
Nelms, D.M., Shake, S. and Lobo, C., Walmart Apollo LLC, 2019. System and Method for
Securing Private Keys Behind a Biometric Authentication Gateway. U.S. Patent Application
16/354,385.
Schultz, P.T. and Sartini, R.A., Verizon Patent and Licensing Inc, 2016. Method and system
for multi-factor biometric authentication. U.S. Patent 9,323,912.
Smith, N.M., Cahill, C.P., Sheller, M.J. and Martin, J., Intel Corp, 2015. Technologies for
secure storage and use of biometric authentication information. U.S. Patent 9,137,247.
Farash, M.S., 2017. An improved password‐based authentication scheme for session
initiation protocol using smart cards without verification table. International Journal of
Communication Systems, 30(1), p.e2879.
References
Lindell, Y. and Pe'er, G., Unbound Tech Ltd and Bar-Ilan University, 2019. System and
method for authenticating a person using biometric data. U.S. Patent Application
15/979,822.
Nelms, D.M., Shake, S. and Lobo, C., Walmart Apollo LLC, 2019. System and Method for
Securing Private Keys Behind a Biometric Authentication Gateway. U.S. Patent Application
16/354,385.
Schultz, P.T. and Sartini, R.A., Verizon Patent and Licensing Inc, 2016. Method and system
for multi-factor biometric authentication. U.S. Patent 9,323,912.
Smith, N.M., Cahill, C.P., Sheller, M.J. and Martin, J., Intel Corp, 2015. Technologies for
secure storage and use of biometric authentication information. U.S. Patent 9,137,247.
Farash, M.S., 2017. An improved password‐based authentication scheme for session
initiation protocol using smart cards without verification table. International Journal of
Communication Systems, 30(1), p.e2879.
1 out of 5
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.