A Study on Digital Signature Authentication Algorithm Based on Multi-Factor and Public Key Infrastructure

  • Authors

    • Yoon-Jae Park
    • Yong-Hoon Lim
    • Myung-Sin Chae
    https://doi.org/10.14419/ijet.v8i1.4.26320

    Received date: January 21, 2019

    Accepted date: January 21, 2019

    Published date: February 20, 2026

  • Digital Signature, Information Security, PASSCON, Password free authentication, Verification Technology
  • Abstract

    Today most people have connected each other with information communications technology (ICT) under Internet of Things (IOT) environment. It is not awkward to have more interactions with someone they never knew. The security has become very critical in IT systems, for the security most of services rely solely on password-based authentication that has made little technological progress over past decades. The password-based authentication is exposed directly to security vulnerabilities in IOT environment, thus leading to constant increase in security incidents. The research developed an innovative authentication method, called PASSCON, as a new digital signature authentication algorithm. It explains the algorism and explain why its users would feel comfortable and secure by using it. It also suggestion proof to verify its effectiveness. It does not use text-based authentication, which causes security flaw in password-based authentication. It works only on the user’s dashboard. This can block SQL Injection Attack or Brute Force Dictionary Attack.  In addition, the digital ink is used only on the specified device.  It also prevents other device from generating an electronic signature even if it is a correct icon key. That is, even if the key of the user’s information is leaked, the user's account is protected

  • References

    1. D. H, Choi, S. J. Kim, & D. H Won. One-Time Password Technology Ananlysis and its Standization Trend, Review Korea Institute of In-formation Security and Cryptology (2007)., Vol. 17, No. 3, pp. 12-17.
    2. Financial Security Institute Comparison of Credit Card Alternative Authentication Technology, Dept. Security Research, Team of Se-curity Technology, (2016), pp.1-11
    3. H. B. Ahn, Status of Adaptation of FinTech in Korea, Communica-tions of the Korean Institute of Information Scientists and Engi-neers (2016), Vol. 34, No. 4, pp. 29-33
    4. J. M. Sung, S. M. Lee, B. N. Noh, & S. H. Ahn, Extensional End-to-End Encryption Technologies to Enhance User's Financial Infor-mation Security and Considerable Security Issues. Journal of the Korea Institute of Information Security and Cryptology (2010), Vol. 20, No. No. 4, pp. 145-154
    5. Y. J. Shin. (2017). A Study on the Personal Information Protection for Improvement of Personal Identification: Focusing on the alter-native means of resident number for users, Journal of Korean Re-gional Information (2017), Vol. 20, No. 2, pp. 1-2
    6. Seungjin Han. (2018). A Secure Decentralized Storage Scheme of Private Information in Blockchain Environments. Journal of Com-puter Information Society, 23(1), pp. 111-116.
    7. TSUDIK, Gene. Message authentication with one-way hash functions. In: INFOCOM'92. Eleventh Annual Joint Conference of the IEEE Computer and Communications Societies, IEEE. IEEE, 1992. pp. 2055-2059.
    8. GRZONKOWSKI, Slawomir; CORCORAN, Peter M.; COUGH-LIN, Thomas. Security analysis of authentication protocols for next-generation mobile and CE cloud services. In: Consumer Electronics-Berlin (ICCE-Berlin), 2011 IEEE International Conference on. IEEE, 2011. pp. 83-87.
    9. McMahon, R., Bressler, M. S., & Bressler, L. (2016). New global cy-bercrime calls for high-tech cyber-cops. Journal of Legal, Ethical and Regulatory Issues, 19(1), pp.1-3.
    10. Y. J. Park, Y. H. Lim, M. S. Chae, A Study on Passwordless Au-thentication Technology and Its Effects, International Journal of Reliable Information and Assurance (2018), 6( 1), pp.1-5
  • Downloads

  • How to Cite

    Park, Y.-J., Lim, Y.-H., & Chae, M.-S. (2026). A Study on Digital Signature Authentication Algorithm Based on Multi-Factor and Public Key Infrastructure. International Journal of Engineering and Technology, 8(1.4), 630-639. https://doi.org/10.14419/ijet.v8i1.4.26320