Preserving User-Participation in Insecure Networks Based on Visual Secret Sharing and Authentication

碩士 === 逢甲大學 === 資訊工程所 === 98 === How to provide confidential communications for involved users is always a critical challenge in designing a network system. Especially, people must face many kinds of malicious attacks while surfing over an insecure network, such as brute force attack, password guess...

Full description

Bibliographic Details
Main Authors: Ming-Huang Hsieh, 謝銘晃
Other Authors: Chin-Chen Chang
Format: Others
Language:en_US
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/96369210582844410837
Description
Summary:碩士 === 逢甲大學 === 資訊工程所 === 98 === How to provide confidential communications for involved users is always a critical challenge in designing a network system. Especially, people must face many kinds of malicious attacks while surfing over an insecure network, such as brute force attack, password guessing attack, Dos attack, masquerade attack, replay attack, or Trojan horse risk. Let us survey these attacks in more detail, and we can find the fact that the intruder usually launches these through thousands of trials without the interaction between the user and server. Of course, these trials are performed via bots. Thus we aim to develop a robust system which can guarantee the user-participation essential in the communication. That is, if involved participants can not prove that they are human beings, then the system will terminate the connection to prevent the attack. To achieve this, we apply the techniques of CAPTCHA and visual secret sharing into this system. In addition to giving a formal proof to show the correctness of the authentication between involved participants under the BAN logic model, we have conduced experiments to demonstrate the practicability of our system.