MODELING AND STUDYING AUTHENTICATORS OF WEB SITES BASED ON SRP PROTOCOL

Authors

  • S. Gavrilenko

DOI:

https://doi.org/10.26906/SUNZ.2019.3.080

Keywords:

Authentication, Web Sites, Information Security, SRP-Protocol

Abstract

Analysis of simulation and research of site authenticator based on SRP-protocol. It is proved that the proposed approach is resistant to mediator attacks. The client, according to the SRP protocol, does not send the user password to the server, but calculates the key based on it. Having a password verifier received at registration, the server can also calculate this key. On the open channel is not the key itself, but the special checking values. Developed a mobile client application for the Android OS and Free make for the server in PHP. The application performs user registration and authentication procedures in accordance with the SRP protocol. Because it is assumed that the user will work with the website from another device, the application generates a special key value based on the session key. To access the site from any device in the form of authentication, the client enters the value of not the password itself, but the access key that is sent to the server and verifies.

Downloads

Download data is not yet available.

References

Виростков Д. Обзор способов и протоколов аутентификации в веб-приложениях [Електронний ресурс] / Д. Виростков // Хабр. – 2015. – Режим доступу до ресурсу: https://habr.com/company/dataart/blog/262817

Давлетханов М. Концепция одноразовых паролей в системе аутентификации [Електронний ресурс] / М. Давлетханов // BYTE. – 2006. – Режим доступу до ресурсу: https://www.bytemag.ru/articles/detail.php?ID=9101

Kuchuk G.A. An Approach To Development Of Complex Metric For Multiservice Network Security Assessment / G.A. Kuchuk, A.A. Kovalenko, A.A. Mozhaev // Statistical Methods Of Signal and Data Processing (SMSDP – 2010): Proc. Int. Conf., October 13-14, 2010.– Kiev: NAU, RED, IEEE Ukraine section joint SP, 2010. – P. 158 – 160.

Kuchuk G., Nechausov S., Kharchenko, V. Two-stage optimization of resource allocation for hybrid cloud data store. International Conference on Information and Digital Technologies. Zilina, 2015. P. 266-271. DOI: http://dx.doi.org/10.1109/DT.2015.7222982

Федоров А. SRP-6: аутентификация без передачи пароля. 2011. URL : https://habr.com/post/121021.

Фергюсон Н. Практическая криптографія / н. Фергюсон, Б. Шнайер, Вильямс 2004, 432 с.

Amin Salih M., Yuvaraj D., Sivaram M., Porkodi V. Detection And Removal Of Black Hole Attack In Mobile Ad Hoc Networks Using Grp Protocol. International Journal of Advanced Research in Computer Science. Vol. 9, No 6. P. 1–6, DOI: http://dx.doi.org/10.26483/ijarcs.v9i6.6335

Yogesh Awasthi, R P Agarwal, B K Sharma, "Intellectual property right protection of browser based software through watermarking technique", International Journal of Computer Applications, vol. 97, no. 12, 2014, pp. 32-36.

Yogesh Awasthi, R P Agarwal, B K Sharma, "Two Phase Watermarking for Security in Database", International Journal of Computing, vol. 4, no. 4, 2014, pp. 821-824

Saravanan S., Hailu M., Gouse G.M., Lavanya M., Vijaysai R. Optimized Secure Scan Flip Flop to Thwart Side Channel Attack in Crypto-Chip. International Conference on Advances of Science and Technology, ICAST 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Vol 274. Springer, Cham. DOI: https://doi.org/10.1007/978-3-030-15357-1_34

Manikandan V, Porkodi V, Mohammed AS, Sivaram M, “Privacy Preserving Data Mining Using Threshold Based Fuzzy cmeans Clustering”, ICTACT Journal on Soft Computing, Vol. 9, Is. 1, 2018, pp.1813-1816. DOI: 10.21917/ijsc.2018.0252

Ruban, I. Redistribution of base stations load in mobile communication networks / I. Ruban, H. Kuchuk, A. Kovalenko // Innovative technologies and scientific solutions for industries. – 2017. – No 1 (1) – P. 75-81. – DOI : https://doi.org/10.30837/2522-9818.2017.1.075

Teilor.D Using the Secure Remote Password (SRP) Protocol for TLS Authentication [Електронний ресурс] / Д. Тейлор // IETF. – 2007. – Режим доступу до ресурсу: https://tools.ietf.org/html/rfc5054#ref-MODP;

Semenov S. Identification of the state of an object under conditions of fuzzy input data / S. Semenov, O. Sira, S. Gavrylenko, N. Kuchuk // Eastern-european journal of enterprise technologies.– Kharkiv. 2019 No. 4(97). P.22-30 (SCOPUS)

Published

2019-06-21