Professional Documents
Culture Documents
Iaetsd-Authenticating Password by Means of Numerous
Iaetsd-Authenticating Password by Means of Numerous
www.iaetsd.in
M.Tech Student, Dept of CSE, Audisankara College of Engineering & Technology, Gudur, A.P, India
Associate Professor, Dept of CSE, Audisankara College of Engineering & Technology, Gudur, A.P, India
ABSTRACT:
1. INTRODUCTION:
an
attacker.
When
this
is
probable
in
passwords
support
of
against
password
accurate
based
www.iaetsd.in
safe
symmetric
password
key exchange
denial-of-service
an additional
where
terms
parallel.
novel
password
additionally
authenticated
We
symmetric
attack,
put
forward
two-server
communications
numerous
of
symmetric
2. METHODOLOGY:
solution
subsequent
for
two-server
servers
computation
competent
two-server
to
exist.
as
than
Our
well
as
active
password
terms of parallel
our
public
where
login
an
information
client.
an
working
attacker
adversary
out,
www.iaetsd.in
effort
obtain
to
channel
which
might
be
the
communications
between
is
compromised.
An
active
3. RESULTS:
We put forward a novel symmetric
solution
for
two-server
password
our
procedure
password-only
representation.
follows
Security
is
compromised.
Performance
www.iaetsd.in
server
key
symmetric
effectiveness
additionally
symmetric
password
symmetric
authenticated
competent
than
two-server
active
two-server
for
two
practical
server
password
use.
password
password
our
out,
imagine
servers to
4. CONCLUSION:
through
dissimilar
secure
channels
secret.
In
two-server
password
validate
clients
services
and
towards
make
available
authentic
clients.
www.iaetsd.in
Infrastructure
for
Collaborative
server
password
authenticated
key
REFERENCES
Multiple
Servers,
Proc.
Conf.
Topics
in
Cryptography,
IEEE
Trans.
Information
Applications
of
Cryptographic
Techniques
of
Cryptology
and
Information
Threshold
Password-Authenticated