A Password-Based Authentication System Based on the CAPTCHA AI Problem

被引:10
作者
Alajmi, Masoud [1 ]
Elashry, Ibrahim [2 ]
El-Sayed, Hala S. [3 ]
Faragallah, Osama S. [4 ,5 ]
机构
[1] Taif Univ, Dept Comp Engn, At Taif 21974, Saudi Arabia
[2] Kafrelsheikh Univ, Dept Elect Engn, Kafr El Shaikh 33511, Egypt
[3] Menoufia Univ, Dept Elect Engn, Fac Engn, Shibin Al Kawm 32511, Egypt
[4] Taif Univ, Dept Informat Technol, Coll Comp & Informat Technol, At Taif 21974, Saudi Arabia
[5] Menoufia Univ, Dept Comp Sci & Engn, Fac Elect Engn, Menoufia 32952, Egypt
关键词
Password-based authentication; CAPTCHA; AI hard problems;
D O I
10.1109/ACCESS.2020.3018659
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Powerful cryptographic systems based on mathematically hard problems are utilized to ensure tighter security for data communication purposes. However, these traditional cryptographic systems are bound to fail in the ensuing era of quantum computing. Thus, Artificial Intelligence (AI) inspired security methods are needed to secure communications in the era of quantum computing. This article presents a challenge-response password-based authentication system based on the Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) AI hard problem. In this system, a server sends a challenge text to a client, then the client generates a random image and blends the challenge text inside this random image using his password. Then the client sends the generated image to the server. The server extracts the challenge text from the sent image using his copy of the client's password. If the extracted challenge text is the same as the sent challenge text, then both the client's and the server's copies of the password match and the client is authenticated. The efficiency of the proposed system is analyzed and the outcomes prove that the proposed system is efficient in terms of time and space. Also, a security investigation of the proposed system is employed, and the results prove that the system is probabilistic and very sensitive to changes in its parameters. It does not leak any statistical information about the client's password and the generated images cannot be distinguished from random images. In addition, the security of the proposed system is analyzed against two possible attacks; the brute force attack and the replay attack and the results prove that the proposed system is immune to these attacks. Finally, the proposed system is ensured to be indistinguishably secure against an adaptive chosen-challenge text attack (IND-ACCTA), based on the CAPTCHA AI hard problem when the hash function $H$ is modeled as a random oracle.
引用
收藏
页码:153914 / 153928
页数:15
相关论文
共 23 条
[1]   Efficient Image Cipher Based on Baker Map in the Discrete Cosine Transform [J].
Alhumyani, Hesham .
CYBERNETICS AND INFORMATION TECHNOLOGIES, 2020, 20 (01) :68-81
[2]   Is image-based CAPTCHA secure against attacks based on machine learning? An experimental study [J].
Alqahtani, Fatmah H. ;
Alsulaiman, Fawaz A. .
COMPUTERS & SECURITY, 2020, 88
[3]  
[Anonymous], 2018, IEEE ACCESS, DOI DOI 10.1109/ACCESS.2018.2855408
[4]   Authentication systems: A literature review and classification [J].
Barkadehi, Mohammadreza Hazhirpasand ;
Nilashi, Mehrbaksh ;
Ibrahim, Othman ;
Fardi, Ali Zakeri ;
Samad, Sarminah .
TELEMATICS AND INFORMATICS, 2018, 35 (05) :1491-1511
[5]   A Survey on quantum computing technology [J].
Gyongyosi, Laszlo ;
Imre, Sandor .
COMPUTER SCIENCE REVIEW, 2019, 31 :51-71
[6]  
Hovelmanns K., 2020, P IACR, P389
[7]   Informed Histogram-Based Watermarking [J].
Hua, Guang ;
Xiang, Yong ;
Zhang, Leo Yu .
IEEE SIGNAL PROCESSING LETTERS, 2020, 27 :236-240
[8]   Quantum algorithm for solving hyperelliptic curve discrete logarithm problem [J].
Huang, Yan ;
Su, Zhaofeng ;
Zhang, Fangguo ;
Ding, Yong ;
Cheng, Rong .
QUANTUM INFORMATION PROCESSING, 2020, 19 (02)
[9]   Medical JPEG image steganography based on preserving inter-block dependencies [J].
Liao, Xin ;
Yin, Jiaojiao ;
Guo, Sujing ;
Li, Xiong ;
Sangaiah, Arun Kumar .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 67 :320-329
[10]  
Meshram C., 2020, P 1 INT C COMP COMM, P427