Securing SignSupprt F ocusing on user authentication and data encryption - PowerPoint PPT Presentation

mateja
securing signsupprt f ocusing on user authentication and data encryption n.
Skip this Video
Loading SlideShow in 5 Seconds..
Securing SignSupprt F ocusing on user authentication and data encryption PowerPoint Presentation
Download Presentation
Securing SignSupprt F ocusing on user authentication and data encryption

play fullscreen
1 / 13
Download Presentation
Securing SignSupprt F ocusing on user authentication and data encryption
64 Views
Download Presentation

Securing SignSupprt F ocusing on user authentication and data encryption

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Securing SignSupprtFocusing on user authentication and data encryption Student name: Lindokuhle Duma Supervisor: Prof. Tucker

  2. Proposed overall solution

  3. Pattern authentication • Visual for Deaf users instead of text • Deaf people are accustomed to signed language • Easy to remember visuals than text [1]

  4. Disadvantages of pattern password • Smudge attack [2] • Over shoulder surfing[3]

  5. Encryption abuse case

  6. Better solution for Encryption • Files should stay Encrypted • Only encrypt the file’s content in memory

  7. Low level Design • Read the input from the file • Generate a random key • Ensure that the key is of the correct bits • Encrypt the input data into cipher text • Return cipher text

  8. RSA Encryption source code

  9. Project plan

  10. References • [1] Jansen, W. (2004). Authenticating mobile device users through image selec-tion. The Internet Society: Advances in Learning, Commerce and Security,1, 183-194. • [2] Aviv J., Gibson, K., Mossop, E., Blaze, M., and Smith, J. M. (2010, August). Smudge attacks on smartphone touch screens.InProceedings of the4th USENIX conference • [3] CA Technologies (2011),authentication-system CE technolo-gies,Advanceauthentication methods: software vs. hardware http :==www:ca:com= =media=F iles=whitepapers=AMMebooklayout:pdf • [4] Mallow, Christopher. (2007) Authentication Methods and Tech-niques. Global Information Assurance Certication. http://www.giac.org/resources/whitepaper/access/2.php. Retrieved on October 17, 2007.

  11. Demo

  12. Thank You