Visible to the public Two Factor Hash Verification (TFHV): A Novel Paradigm for Remote Authentication

TitleTwo Factor Hash Verification (TFHV): A Novel Paradigm for Remote Authentication
Publication TypeConference Paper
Year of Publication2020
AuthorsObaidat, Muath, Brown, Joseph
Conference Name2020 International Symposium on Networks, Computers and Communications (ISNCC)
Date PublishedOct. 2020
ISBN Number978-1-7281-5628-6
Keywordsauthentication, biometrics (access control), Encryption, Human Behavior, human factors, information, password, passwords, pubcrawl, resilience, security, Servers, Two factor Authentication
AbstractCurrent paradigms for client-server authentication often rely on username/password schemes. Studies show such schemes are increasingly vulnerable to heuristic and brute-force attacks. This is either due to poor practices by users such as insecure weak passwords, or insecure systems by server operators. A recurring problem in any system which retains information is insecure management policies for sensitive information, such as logins and passwords, by both hosts and users. Increased processing power on the horizon also threatens the security of many popular hashing algorithms. Furthermore, increasing reliance on applications that exchange sensitive information has resulted in increased urgency. This is demonstrated by a large number of mobile applications being deemed insecure by Open Web Application Security Project (OWASP) standards. This paper proposes a secure alternative technique of authentication that retains the current ecosystem, while minimizes attack vectors without inflating responsibilities on users or server operators. Our proposed authentication scheme uses layered encryption techniques alongside a two-part verification process. In addition, it provides dynamic protection for preventing against common cyber-attacks such as replay and man-in-the-middle attacks. Results show that our proposed authentication mechanism outperform other schemes in terms of deployability and resilience to cyber-attacks, without inflating transaction's speed.
Citation Keyobaidat_two_2020