An authentication protocol based on chaos and zero knowledge proof

Autor: William J Buchanan, Jawad Ahmad, Will Major
Rok vydání: 2020
Předmět:
FOS: Computer and information sciences
Computer Science - Cryptography and Security
Port knocking
Computer science
QA75 Electronic computers. Computer science
Aerospace Engineering
Ocean Engineering
02 engineering and technology
Cyber-security
01 natural sciences
Firewall (construction)
Server
0103 physical sciences
Centre for Distributed Computing
Networking and Security

0202 electrical engineering
electronic engineering
information engineering

Electrical and Electronic Engineering
010301 acoustics
Password
Stateless protocol
Authentication
business.industry
Applied Mathematics
Mechanical Engineering
020206 networking & telecommunications
Port (computer networking)
AI and Technologies
Computer Science - Distributed
Parallel
and Cluster Computing

005.8 Data security
Control and Systems Engineering
Authentication protocol
Distributed
Parallel
and Cluster Computing (cs.DC)

business
Cryptography and Security (cs.CR)
Computer network
Zdroj: Nonlinear Dynamics. 99:3065-3087
ISSN: 1573-269X
0924-090X
DOI: 10.1007/s11071-020-05463-3
Popis: Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authenticated clients, without opening ports on the firewall. Advances in port knocking have resulted in an increase in complexity in design, preventing port knocking solutions from realising their potential. This paper proposes a novel port knocking solution, named Crucible, which is a secure method of authentication, with high usability and features of stealth, allowing servers and services to remain hidden and protected. Crucible is a stateless solution, only requiring the client memorise a command, the server's IP and a chosen password. The solution is forwarded as a method for protecting servers against attacks ranging from port scans, to zero-day exploitation. To act as a random oracle for both client and server, cryptographic hashes were generated through chaotic systems.
J. Nonlinear Dyn (2020)
Databáze: OpenAIRE