1 / 13

Securing SignSupprt F ocusing on user authentication and data encryption

Securing SignSupprt F ocusing on user authentication and data encryption. Student name: Lindokuhle Duma Supervisor: Prof. Tucker. Proposed overall solution. P attern authentication. Visual for Deaf users instead of text Deaf people are accustomed to signed language

mateja
Download Presentation

Securing SignSupprt F ocusing on user authentication and data encryption

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Securing SignSupprtFocusing on user authentication and data encryption Student name: Lindokuhle Duma Supervisor: Prof. Tucker

  2. Proposed overall solution

  3. Pattern authentication • Visual for Deaf users instead of text • Deaf people are accustomed to signed language • Easy to remember visuals than text [1]

  4. Disadvantages of pattern password • Smudge attack [2] • Over shoulder surfing[3]

  5. Encryption abuse case

  6. Better solution for Encryption • Files should stay Encrypted • Only encrypt the file’s content in memory

  7. Low level Design • Read the input from the file • Generate a random key • Ensure that the key is of the correct bits • Encrypt the input data into cipher text • Return cipher text

  8. RSA Encryption source code

  9. Project plan

  10. References • [1] Jansen, W. (2004). Authenticating mobile device users through image selec-tion. The Internet Society: Advances in Learning, Commerce and Security,1, 183-194. • [2] Aviv J., Gibson, K., Mossop, E., Blaze, M., and Smith, J. M. (2010, August). Smudge attacks on smartphone touch screens.InProceedings of the4th USENIX conference • [3] CA Technologies (2011),authentication-system CE technolo-gies,Advanceauthentication methods: software vs. hardware http :==www:ca:com= =media=F iles=whitepapers=AMMebooklayout:pdf • [4] Mallow, Christopher. (2007) Authentication Methods and Tech-niques. Global Information Assurance Certication. http://www.giac.org/resources/whitepaper/access/2.php. Retrieved on October 17, 2007.

  11. Demo

  12. Thank You

More Related