SSO-Key Distribution Center Based Implementation Using Symmetric Encryption Technique for Distributed Network (Securing SSO in Distributed Network)

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3

Abstract

Single sign-on (SSO) is a session/user authentication process that permits a user to enter one name and password in order to access multiple applications. The process authenticates the user for all the applications they have been given rights to and eliminates further prompts when they switch applications during a particular session. Unforgeability, credential privacy, and soundness are the basic requirements of any SSO scheme. Chang and Lee proposed new SSO scheme and claimed its security by providing well organized security arguments. But their scheme is actually insecure as it fails to meet credential privacy and soundness of authentication. Specifically, their scheme suffers from two severe attacks. The first attack allows a malicious service provider, who has successfully communicated with a legal user twice, to recover the user’s credential and then to impersonate the user to access resources and services offered by other service providers. In another attack, i.e. an outsider attack, by an unauthorized or illegitimate user of the system may be able to enjoy network services freely by impersonating any legal user or a nonexistent user. So to overcome these drawbacks, we propose an improvement to Chang and Lee SSO scheme by making use of efficient symmetric key encryption technique of SERPENT key signatures.

Authors and Affiliations

Keywords

Related Articles

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

Ad-hoc mobile networks are very dynamic, self-organizing; self-healing distributed networks which support data networking without an infrastructure. Instead of relying on a base station to coordinate the flow of messages...

Tribological and Mechanical Behaviour of Molybdenum Thin Film Nanocoatings Prepared by Magnetron Sputtering

Coatings and surface engineering are used to protect manufactured components from thermal or corrosive degradation, impart wear resistance and hardness to the surface while retaining the toughness and ductili...

High Speed 8-bit Counters using State Excitation Logic and their Application in Frequency Divider

Two innovative high-speed low power parallel 8-bit counter architectures are proposed. Then, High speed 8-bit frequency divider circuits using the proposed architectures are realized. The proposed parallel counter archit...

Secure Data Aggregation in Wireless Sensor Networks: A Survey

Recent advances in wireless sensor networks (WSNs) have led to many new applications including habitat monitoring and target tracking. Sensor nodes spend most of their energy during data transmission. With data aggre...

Encryption Algorithms Used for Secured Communication

With the development of the digital devices, computers and networks, our world relies more and more on the digital data. In many cases, storing data safely is a very big concern. These data have to be protected so as to...

Download PDF file
  • EP ID EP357365
  • DOI -
  • Views 69
  • Downloads 0

How To Cite

(2015). SSO-Key Distribution Center Based Implementation Using Symmetric Encryption Technique for Distributed Network (Securing SSO in Distributed Network). International Journal of Science and Research (IJSR), 4(3), -. https://europub.co.uk/articles/-A-357365