Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication

被引:7
作者
Gulsezim, Duisen [1 ]
Zhansaya, Seiitkaliyeva [1 ]
Razaque, Abdul [2 ]
Ramina, Yestayeva [1 ]
Amsaad, Fathi [3 ]
Almiani, Muder [4 ]
Ganda, Raouf [5 ]
Oun, Ahmed [6 ]
机构
[1] Int Inf Tech Univ, Comp Engn & Secur, Alma Ata, Kazakhstan
[2] NYIT, Dept Comp Sci, Nanjing, Peoples R China
[3] Eastern Michigan Univ, Sch Informat Secur & Appl Comp, Ypsilanti, MI 48197 USA
[4] Al Hussein Bin Talal Univ, Comp Informat Sci, Maan, Jordan
[5] Yale Univ, Yale Sch Management, New Haven, CT 06520 USA
[6] Univ Toledo, EECS Dept, 2801 W Bancroft St, Toledo, OH 43606 USA
来源
2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS) | 2019年
关键词
Twofish encryption; visual cryptography; encryption; graphical password; alphanumeric password system; authentication method; two factor authentication;
D O I
10.1109/iotsms48152.2019.8939261
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Dependence of the individuals on the Internet for performing the several actions require secure data communication. Thus, the reliable data communication improves the confidentiality. As, enhanced security leads to reliable and faster communication. To improve the reliability and confidentiality, there is dire need of fully secured authentication method. There are several methods of password protections were introduced to protect the confidentiality and reliability. Most of the existing methods are based on alphanumeric approaches, but few methods provide the dual authentication process. In this paper, we introduce improved graphical password authentication using Twofish Encryption and Visual Cryptography (TEVC) method. Our proposed TEVC is unpredictably organized as predicting the correct graphical password and arranging its particles in the proper order is harder as compared to traditional alphanumeric password system. TEVC is tested by using JAVA platform. Based on the testing results, we confirm that proposed TEVC provides secure authentication. TEVC encryption algorithm detected as more prudent and possessing lower time complexity as compared to other known existing algorithms message code confirmation and fingerprint scan with password.
引用
收藏
页码:405 / 411
页数:7
相关论文
共 19 条
  • [1] Anwar M., 2015, MAICS, P13
  • [2] Chanda Katha, 2016, International Journal of Computer Network and Information Security, V8, P23, DOI 10.5815/ijcnis.2016.07.04
  • [3] Cherdmuangpak N, 2017, INT JOINT CONF COMP
  • [4] Darabseh A, 2015, IEEE INT CONF COMM, P1871, DOI 10.1109/ICCW.2015.7247453
  • [5] OTPaaS-One Time Password as a Service
    Erdem, Emir
    Sandikkaya, Mehmet Tahir
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (03) : 743 - 756
  • [6] Cross-lingual Short-Text Document Classification for Facebook Comments
    Faqeeh, Mosab
    Abdulla, Nawaf
    Al-Ayyoub, Mahmoud
    Jararweh, Yaser
    Quwaider, Muhannad
    [J]. 2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, : 573 - 578
  • [7] Construction of a secure two-factor user authentication system using fingerprint information and password
    Go, Woong
    Lee, Kwangwoo
    Kwak, Jin
    [J]. JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (02) : 217 - 230
  • [8] Secure Online Transaction Algorithm: Securing Online Transaction Using Two-Factor Authentication
    Gualdoni, Joseph
    Kurtz, Andrew
    Myzyri, Ilva
    Wheeler, Megan
    Rizvi, Syed
    [J]. COMPLEX ADAPTIVE SYSTEMS CONFERENCE WITH THEME: ENGINEERING CYBER PHYSICAL SYSTEMS, CAS, 2017, 114 : 93 - 99
  • [9] Jararweh Y., 2012, J. Inf. Secur, V3, P69, DOI [10.4236/jis.2012.32008, DOI 10.4236/JIS.2012.32008]
  • [10] Biohashing: two factor authentication featuring fingerprint data and tokenised random number
    Jin, ATB
    Ling, DNC
    Goh, A
    [J]. PATTERN RECOGNITION, 2004, 37 (11) : 2245 - 2255