A Study on Digital Signature Authentication Algorithm Based on Multi-Factor and Public Key Infrastructure

  • Authors

    • Yoon-Jae Park
    • Yong-Hoon Lim
    • Myung-Sin Chae
    https://doi.org/10.14419/ijet.v8i1.4.26320
  • Digital Signature, Information Security, PASSCON, Password free authentication, Verification Technology
  • Today most people have connected each other with information communications technology (ICT) under Internet of Things (IOT) environment. It is not awkward to have more interactions with someone they never knew. The security has become very critical in IT systems, for the security most of services rely solely on password-based authentication that has made little technological progress over past decades. The password-based authentication is exposed directly to security vulnerabilities in IOT environment, thus leading to constant increase in security incidents. The research developed an innovative authentication method, called PASSCON, as a new digital signature authentication algorithm. It explains the algorism and explain why its users would feel comfortable and secure by using it. It also suggestion proof to verify its effectiveness. It does not use text-based authentication, which causes security flaw in password-based authentication. It works only on the user’s dashboard. This can block SQL Injection Attack or Brute Force Dictionary Attack.  In addition, the digital ink is used only on the specified device.  It also prevents other device from generating an electronic signature even if it is a correct icon key. That is, even if the key of the user’s information is leaked, the user's account is protected

     

     


     
  • References

    1. [1] D. H, Choi, S. J. Kim, & D. H Won. One-Time Password Technology Ananlysis and its Standization Trend, Review Korea Institute of Information Security and Cryptology (2007)., Vol. 17, No. 3, pp. 12-17.

      [2] Financial Security Institute Comparison of Credit Card Alternative Authentication Technology, Dept. Security Research, Team of Security Technology, (2016), pp.1-11

      [3] H. B. Ahn, Status of Adaptation of FinTech in Korea, Communications of the Korean Institute of Information Scientists and Engineers (2016), Vol. 34, No. 4, pp. 29-33

      [4] J. M. Sung, S. M. Lee, B. N. Noh, & S. H. Ahn, Extensional End-to-End Encryption Technologies to Enhance User's Financial Information Security and Considerable Security Issues. Journal of the Korea Institute of Information Security and Cryptology (2010), Vol. 20, No. No. 4, pp. 145-154

      [5] Y. J. Shin. (2017). A Study on the Personal Information Protection for Improvement of Personal Identification: Focusing on the alternative means of resident number for users, Journal of Korean Regional Information (2017), Vol. 20, No. 2, pp. 1-2

      [6] Seungjin Han. (2018). A Secure Decentralized Storage Scheme of Private Information in Blockchain Environments. Journal of Computer Information Society, 23(1), pp. 111-116.

      [7] TSUDIK, Gene. Message authentication with one-way hash functions. In: INFOCOM'92. Eleventh Annual Joint Conference of the IEEE Computer and Communications Societies, IEEE. IEEE, 1992. pp. 2055-2059.

      [8] GRZONKOWSKI, Slawomir; CORCORAN, Peter M.; COUGHLIN, Thomas. Security analysis of authentication protocols for next-generation mobile and CE cloud services. In: Consumer Electronics-Berlin (ICCE-Berlin), 2011 IEEE International Conference on. IEEE, 2011. pp. 83-87.

      [9] McMahon, R., Bressler, M. S., & Bressler, L. (2016). New global cybercrime calls for high-tech cyber-cops. Journal of Legal, Ethical and Regulatory Issues, 19(1), pp.1-3.

      [10] Y. J. Park, Y. H. Lim, M. S. Chae, A Study on Passwordless Authentication Technology and Its Effects, International Journal of Reliable Information and Assurance (2018), 6( 1), pp.1-5

  • Downloads

  • How to Cite

    Park, Y.-J., Lim, Y.-H., & Chae, M.-S. (2019). A Study on Digital Signature Authentication Algorithm Based on Multi-Factor and Public Key Infrastructure. International Journal of Engineering & Technology, 8(1.4), 630-639. https://doi.org/10.14419/ijet.v8i1.4.26320