Skip to main content

Multilevel Verification and User Recognition Strategy for E-mail Clients

  • Conference paper
  • First Online:
Transactions on Engineering Technologies
  • 1514 Accesses

Abstract

User authentication and identification have always represented a challenge in web-based e-mail systems. The text-based authentication and user identification are not sufficient to address the security issues facing web-based e-mail systems. This sort of security is completely retrograde and obsolete for current security threats that easily undermine authentication, identification and non-repudiation. In this paper, a security increase in e-mail client is proposed by introducing multiple-level authentication and identification in e-mail clients. The proposed multilevel authentication and identification consist of four levels, where level-1 is the text-based authentication, level-2 involves an image based authentication and finally level-3 and level-4 use a specific algorithm that exploits the powerful properties of two mathematical operators called Pentors and UltraPentors applied against the image in level-2.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S.L. Garfinkel, E-mail based authentication and identification: an alternative to PKI. IEEE Comput. Soc. 1(6), 20–26 (2003)

    Google Scholar 

  2. M. Dietz, A. Czeskis, D.S. Wallach, D. Balfanz, Origin-bound certificates: a fresh approach to strong client authentication for the web, in Proceedings of the 21st Usenix Security Symposium, 2012

    Google Scholar 

  3. M. Hern, An update on our war against account hijackers. The Google Blog (2013). Available via GOOGLE Online Security. http://googleonlinesecurity.blogspot.com/2013/02/an-update-on-our-war-against-account.html of subordinate document. Cited 15 June 2013

  4. S. Balaji, Authentication techniques for engendering session passwords with colors and text. Adv. Inf. Technol. Manage. 1(2), 71–78 (2012)

    MathSciNet  Google Scholar 

  5. H. Zhao, X. Li, S3PAS: a scalable shoulder-surfing resistant textual-graphical password authentication scheme, in 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW 07) (2007), pp. 467–472

    Google Scholar 

  6. S. Anand, P. Jain, Nitin, R. Rastogi, Security analysis and implementation of 3-level security system using image based authentication, in Computer Modelling and Simulation (UKSim) (2012), pp. 547–552

    Google Scholar 

  7. H.A. Dinesha, V.K. Agrawal, Multi-level authentication technique for accessing cloud services, in International Conference on Computing, Communication and Applications (ICCCA) (2012), pp. 1–4

    Google Scholar 

  8. R. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  9. D. Boneh, Twenty years of attacks on the RSA cryptosystem. Not. Am. Math. Soc. 46(2), 203–213 (1999)

    MATH  MathSciNet  Google Scholar 

  10. D.J. Wheeler, R.M. Needham, TEA, a tiny encryption algorithm. Lecture Notes in Computer Science (LNCS) (Leuven, Belgium: Fast Software Encryption: Second International Workshop), vol. 1008 (1994), pp. 363–366

    Google Scholar 

  11. J. Kelsey, B. Schneier, D. Wagner, Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X NewDES, RC2, and TEA. Lecture Notes in Computer Science (LNCS) vol. 1334 (1997), pp. 233–246

    Google Scholar 

  12. A. Bogdanov, M. Wang, Zero-correlation linear cryptanalysis with reduced data complexity. Lecture Notes in Computer Science (LNCS) (Fast Software Encryption 2012), vol. 7549 (2012), pp. 29–48

    Google Scholar 

  13. A. Luma, B. Ismaili, B. Raufi, Multilevel user authentication and identification scheme for e-mail clients. in Proceedings of the world congress on engineering, WCE 2013, 3–5 July 2013. Lecture notes in engineering and computer science, London, UK (2013), pp. 1221–1225

    Google Scholar 

  14. A. Luma, B. Raufi, New data encryption algorithm and its implementation for online user authentication, in International Conference on Security and Management, (CSREA Press, USA, 2009), pp. 81–85

    Google Scholar 

  15. A. Luma, B. Raufi, Xh Zenuni, Asymmetric encryption decryption with Pentor and ultra Pentor operators. Online J. Sci. Technol. (TOJSAT) 2(2), 9–12 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Artan Luma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Luma, A., Raufi, B., Ismaili, B. (2014). Multilevel Verification and User Recognition Strategy for E-mail Clients. In: Yang, GC., Ao, SI., Gelman, L. (eds) Transactions on Engineering Technologies. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-8832-8_46

Download citation

  • DOI: https://doi.org/10.1007/978-94-017-8832-8_46

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-017-8831-1

  • Online ISBN: 978-94-017-8832-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics