Abstract
User authentication and identification have always represented a challenge in web-based e-mail systems. The text-based authentication and user identification are not sufficient to address the security issues facing web-based e-mail systems. This sort of security is completely retrograde and obsolete for current security threats that easily undermine authentication, identification and non-repudiation. In this paper, a security increase in e-mail client is proposed by introducing multiple-level authentication and identification in e-mail clients. The proposed multilevel authentication and identification consist of four levels, where level-1 is the text-based authentication, level-2 involves an image based authentication and finally level-3 and level-4 use a specific algorithm that exploits the powerful properties of two mathematical operators called Pentors and UltraPentors applied against the image in level-2.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S.L. Garfinkel, E-mail based authentication and identification: an alternative to PKI. IEEE Comput. Soc. 1(6), 20–26 (2003)
M. Dietz, A. Czeskis, D.S. Wallach, D. Balfanz, Origin-bound certificates: a fresh approach to strong client authentication for the web, in Proceedings of the 21st Usenix Security Symposium, 2012
M. Hern, An update on our war against account hijackers. The Google Blog (2013). Available via GOOGLE Online Security. http://googleonlinesecurity.blogspot.com/2013/02/an-update-on-our-war-against-account.html of subordinate document. Cited 15 June 2013
S. Balaji, Authentication techniques for engendering session passwords with colors and text. Adv. Inf. Technol. Manage. 1(2), 71–78 (2012)
H. Zhao, X. Li, S3PAS: a scalable shoulder-surfing resistant textual-graphical password authentication scheme, in 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW 07) (2007), pp. 467–472
S. Anand, P. Jain, Nitin, R. Rastogi, Security analysis and implementation of 3-level security system using image based authentication, in Computer Modelling and Simulation (UKSim) (2012), pp. 547–552
H.A. Dinesha, V.K. Agrawal, Multi-level authentication technique for accessing cloud services, in International Conference on Computing, Communication and Applications (ICCCA) (2012), pp. 1–4
R. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
D. Boneh, Twenty years of attacks on the RSA cryptosystem. Not. Am. Math. Soc. 46(2), 203–213 (1999)
D.J. Wheeler, R.M. Needham, TEA, a tiny encryption algorithm. Lecture Notes in Computer Science (LNCS) (Leuven, Belgium: Fast Software Encryption: Second International Workshop), vol. 1008 (1994), pp. 363–366
J. Kelsey, B. Schneier, D. Wagner, Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X NewDES, RC2, and TEA. Lecture Notes in Computer Science (LNCS) vol. 1334 (1997), pp. 233–246
A. Bogdanov, M. Wang, Zero-correlation linear cryptanalysis with reduced data complexity. Lecture Notes in Computer Science (LNCS) (Fast Software Encryption 2012), vol. 7549 (2012), pp. 29–48
A. Luma, B. Ismaili, B. Raufi, Multilevel user authentication and identification scheme for e-mail clients. in Proceedings of the world congress on engineering, WCE 2013, 3–5 July 2013. Lecture notes in engineering and computer science, London, UK (2013), pp. 1221–1225
A. Luma, B. Raufi, New data encryption algorithm and its implementation for online user authentication, in International Conference on Security and Management, (CSREA Press, USA, 2009), pp. 81–85
A. Luma, B. Raufi, Xh Zenuni, Asymmetric encryption decryption with Pentor and ultra Pentor operators. Online J. Sci. Technol. (TOJSAT) 2(2), 9–12 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Luma, A., Raufi, B., Ismaili, B. (2014). Multilevel Verification and User Recognition Strategy for E-mail Clients. In: Yang, GC., Ao, SI., Gelman, L. (eds) Transactions on Engineering Technologies. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-8832-8_46
Download citation
DOI: https://doi.org/10.1007/978-94-017-8832-8_46
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-017-8831-1
Online ISBN: 978-94-017-8832-8
eBook Packages: EngineeringEngineering (R0)