Please use this identifier to cite or link to this item:
Title: Hash based quantum key two server password authentication for internet system
Researcher: Thangavel T.S
Guide(s): Krishnan A
Keywords: Internet, password authentication, Public Key Infrastructure, Secure Socket Layer (SSL), Pseudo Random Key Generation, hash
Upload Date: 20-Jan-2014
University: Anna University
Completed Date: 
Abstract: Internet is the most integral part of our daily life and the people who manages their work with internet like bank transaction, online shopping is also constantly growing. The websites which provide these services should be an authenticated one i.e., they should allow the user to create their own username and password with a reliable service. So only qualified people can access their account by password authentication. A technique such as Secure Socket Layer (SSL) is used for a secure transaction purpose. But some websites offers a poor authentication service which leads to password attacks. Normally, users maintain the same username and password for the websites they use. This leads to the hackers to hack the password and can easily retrieve the users personal information. Many cryptographic hash functions are used for the development of secure password system. This causes the user to enter into the burden for maintaining password and public keys to develop the Public Key Infrastructure. A poorly designed hash function can make attacks feasible even if a strong password is chosen. So these problems has drawn attention to the need for new hash methodology to improve the security which is directly related to syndrome decoding problem from the theory of error correcting codes. To avoid the problems cited above, a new proposal technique Pseudo Random Key Generation has been designed to improve the efficiency of password authentication. This Pseudo Random Password authentication system is used mainly for strengthening the user password key. The authentication systems use passwords to authenticate their data. newlineIt stores the password in a central server and the intruder easily obtains the password and gain access to the contents of the user data. To overcome this problem, multi-server systems were being proposed in which the user has to communicate in parallel with several or all of the servers for the purpose of authentication. newline newline newline
Pagination: xviii, 145
Appears in Departments:Faculty of Science and Humanities

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File50.43 kBAdobe PDFView/Open
02_certificates.pdf899.14 kBAdobe PDFView/Open
03_abstract.pdf17.36 kBAdobe PDFView/Open
04_acknowledgement.pdf14.53 kBAdobe PDFView/Open
05_contents.pdf51.53 kBAdobe PDFView/Open
06_chapter 1.pdf99.06 kBAdobe PDFView/Open
07_chapter 2.pdf87.92 kBAdobe PDFView/Open
08_chapter 3.pdf145.87 kBAdobe PDFView/Open
09_chapter 4.pdf338.61 kBAdobe PDFView/Open
10_chapter 5.pdf87.45 kBAdobe PDFView/Open
11_chapter 6.pdf106.5 kBAdobe PDFView/Open
12_chapter 7.pdf18.96 kBAdobe PDFView/Open
13_references.pdf37.87 kBAdobe PDFView/Open
14_publications.pdf19.83 kBAdobe PDFView/Open
15_vitae.pdf13.03 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.