An authentication protocol based on chaos and zero knowledge proof
Autor: | William J Buchanan, Jawad Ahmad, Will Major |
---|---|
Rok vydání: | 2020 |
Předmět: |
FOS: Computer and information sciences
Computer Science - Cryptography and Security Port knocking Computer science QA75 Electronic computers. Computer science Aerospace Engineering Ocean Engineering 02 engineering and technology Cyber-security 01 natural sciences Firewall (construction) Server 0103 physical sciences Centre for Distributed Computing Networking and Security 0202 electrical engineering electronic engineering information engineering Electrical and Electronic Engineering 010301 acoustics Password Stateless protocol Authentication business.industry Applied Mathematics Mechanical Engineering 020206 networking & telecommunications Port (computer networking) AI and Technologies Computer Science - Distributed Parallel and Cluster Computing 005.8 Data security Control and Systems Engineering Authentication protocol Distributed Parallel and Cluster Computing (cs.DC) business Cryptography and Security (cs.CR) Computer network |
Zdroj: | Nonlinear Dynamics. 99:3065-3087 |
ISSN: | 1573-269X 0924-090X |
DOI: | 10.1007/s11071-020-05463-3 |
Popis: | Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authenticated clients, without opening ports on the firewall. Advances in port knocking have resulted in an increase in complexity in design, preventing port knocking solutions from realising their potential. This paper proposes a novel port knocking solution, named Crucible, which is a secure method of authentication, with high usability and features of stealth, allowing servers and services to remain hidden and protected. Crucible is a stateless solution, only requiring the client memorise a command, the server's IP and a chosen password. The solution is forwarded as a method for protecting servers against attacks ranging from port scans, to zero-day exploitation. To act as a random oracle for both client and server, cryptographic hashes were generated through chaotic systems. J. Nonlinear Dyn (2020) |
Databáze: | OpenAIRE |
Externí odkaz: |