International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112 | Views: 249

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015 | Popularity: 6.3 / 10


     

SSO-Key Distribution Center Based Implementation Using Symmetric Encryption Technique for Distributed Network (Securing SSO in Distributed Network)

M Durga Prasanna, Roopa S R


Abstract: Single sign-on (SSO) is a session/user authentication process that permits a user to enter one name and password in order to access multiple applications. The process authenticates the user for all the applications they have been given rights to and eliminates further prompts when they switch applications during a particular session. Unforgeability, credential privacy, and soundness are the basic requirements of any SSO scheme. Chang and Lee proposed new SSO scheme and claimed its security by providing well organized security arguments. But their scheme is actually insecure as it fails to meet credential privacy and soundness of authentication. Specifically, their scheme suffers from two severe attacks. The first attack allows a malicious service provider, who has successfully communicated with a legal user twice, to recover the users credential and then to impersonate the user to access resources and services offered by other service providers. In another attack, i. e. an outsider attack, by an unauthorized or illegitimate user of the system may be able to enjoy network services freely by impersonating any legal user or a nonexistent user. So to overcome these drawbacks, we propose an improvement to Chang and Lee SSO scheme by making use of efficient symmetric key encryption technique of SERPENT key signatures.


Keywords: Authentication, authorization, distributed computer networks, information security, single sign-on SSO


Edition: Volume 4 Issue 3, March 2015


Pages: 1602 - 1607



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
M Durga Prasanna, Roopa S R, "SSO-Key Distribution Center Based Implementation Using Symmetric Encryption Technique for Distributed Network (Securing SSO in Distributed Network)", International Journal of Science and Research (IJSR), Volume 4 Issue 3, March 2015, pp. 1602-1607, https://www.ijsr.net/getabstract.php?paperid=SUB152356, DOI: https://www.doi.org/10.21275/SUB152356



Similar Articles

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1075 - 1080

Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques

Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 11 Issue 7, July 2022

Pages: 1076 - 1080

Issues in IT & Information Security System Development

Shakila Shams, M. Abdus Sobhan, Farruk Ahmed, Ali Shihab Sabbir

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 8 Issue 4, April 2019

Pages: 2003 - 2009

Enhancing Scalability in Cloud Computing: Strategies and Best Practices

Sai Tarun Kaniganti

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article



Top