M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015
SSO-Key Distribution Center Based Implementation Using Symmetric Encryption Technique for Distributed Network (Securing SSO in Distributed Network)
M Durga Prasanna, Roopa S R
Single sign-on (SSO) is a session/user authentication process that permits a user to enter one name and password in order to access multiple applications. The process authenticates the user for all the applications they have been given rights to and eliminates further prompts when they switch applications during a particular session. Unforgeability, credential privacy, and soundness are the basic requirements of any SSO scheme. Chang and Lee proposed new SSO scheme and claimed its security by providing well organized security arguments. But their scheme is actually insecure as it fails to meet credential privacy and soundness of authentication. Specifically, their scheme suffers from two severe attacks. The first attack allows a malicious service provider, who has successfully communicated with a legal user twice, to recover the users credential and then to impersonate the user to access resources and services offered by other service providers. In another attack, i. e. an outsider attack, by an unauthorized or illegitimate user of the system may be able to enjoy network services freely by impersonating any legal user or a nonexistent user. So to overcome these drawbacks, we propose an improvement to Chang and Lee SSO scheme by making use of efficient symmetric key encryption technique of SERPENT key signatures.
Keywords: Authentication, authorization, distributed computer networks, information security, single sign-on SSO
Edition: Volume 4 Issue 3, March 2015
Pages: 1602 - 1607
How to Cite this Article?
M Durga Prasanna, Roopa S R, "SSO-Key Distribution Center Based Implementation Using Symmetric Encryption Technique for Distributed Network (Securing SSO in Distributed Network)", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152356, Volume 4 Issue 3, March 2015, 1602 - 1607
Similar Articles with Keyword 'Authentication'
Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Similar Articles with Keyword 'authorization'
Accountability of Data usage in Cloud Computing
Nitin P. Doiphode, Hemlata Channe
Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device
Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar
Similar Articles with Keyword 'distributed computer networks'
Single Sign-on Secure Password Mechanism for Distributed Computer Networks
Deepali M. Devkate, N. D. Kale
Enhancing Security and Authentication of Single Sign on Mechanism of Distributed Computer Networks
Bommasani Nagasai, P. Srilatha
Similar Articles with Keyword 'information security'
Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar