Pregled bibliografske jedinice broj: 248458
Improving Computer Authentification Systems with Biometric Technologies
Improving Computer Authentification Systems with Biometric Technologies // Proceedings of the 29th International Convention : Information Systems Security : MIPRO 2006 / Čišić, Dragan ; Hutinski, Željko ; Baranović, Mirta ; Sandri, Roberto (ur.).
Rijeka: Hrvatsko informacijsko i dokumentacijsko društvo, 2006. str. 166-171 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)
CROSBI ID: 248458 Za ispravke kontaktirajte CROSBI podršku putem web obrasca
Naslov
Improving Computer Authentification Systems with Biometric Technologies
Autori
Kišasondi, Tonimir ; Bača, Miroslav ; Schatten, Markus
Vrsta, podvrsta i kategorija rada
Radovi u zbornicima skupova, cjeloviti rad (in extenso), znanstveni
Izvornik
Proceedings of the 29th International Convention : Information Systems Security : MIPRO 2006
/ Čišić, Dragan ; Hutinski, Željko ; Baranović, Mirta ; Sandri, Roberto - Rijeka : Hrvatsko informacijsko i dokumentacijsko društvo, 2006, 166-171
Skup
International Convention : Information Systems Security : MIPRO 2006
Mjesto i datum
Opatija, Hrvatska, 22.05.2006. - 26.05.2006
Vrsta sudjelovanja
Predavanje
Vrsta recenzije
Međunarodna recenzija
Ključne riječi
authentication; biometrics
Sažetak
In this paper we will describe that user authentification methods based on hash functions like MD5, NT / NTLM and SHA-1 can be easily compromised. We used methods that utilize cryptanalytic tables based on time memory tradeoff procedures (TMTO) and we analyzed certain limitations on this approach. We suggest improvements to this technique and additional concepts like parallelized creation and querying of tables which improve speed and memory efficiency of the entire procedure. With those modifications a new concept for TMTO procedures is created. We will also describe vulnerabilities based on physical access to a segment of a computer network infrastructure that can compromise almost any quasi secure system. Regarding those vulnerabilities we will present a number of biometric authentification methods that can minimize or nullify this security risks.
Izvorni jezik
Engleski
Znanstvena područja
Informacijske i komunikacijske znanosti
POVEZANOST RADA
Ustanove:
Fakultet organizacije i informatike, Varaždin