Strong user authentication mechanisms
Independent thesis Basic level (professional degree)Student thesisAlternative title
Starka användarverifieringsmekanismer (Swedish)
For Siemens Industrial Turbomachinery to meet its business objectives a modular authentication concept has to be implemented. Such a mechanism must be cost- effective while providing a well-balanced level of security, easy maintenance and be as user-friendly as possible.
Authenticating users securely involves the combination of two fields, theory of authentication mechanisms in information systems and human computer interaction. To construct a strong user authentication system the correlations of these fields has to be understood and provide guidance in the design.
Strong user authentication mechanisms enforce the use of two-factor authentication or more. The combinations implemented rely on knowledge, possession and sometimes logical-location.
A user authentication system has been implemented using leading industrial products as building blocks glued together with security analysis, programming and usability research.
The thesis is divided into two parts, the first part giving the theoretical background of cryptography, authentication theory and protocols needed for the understanding of the second part, providing security analysis, blueprints, and detailed discussions on the implemented system.
Conclusions have been drawn regarding the implemented system and its context as well as from strict theoretical reasoning regarding the authentication field in general. Conclusions include:
· The unsuitability of remote authentication using biometrics
· The critical importance of client security in remote authentication
· The importance of a modular structure for the security of complex network-based systems
Place, publisher, year, edition, pages
Institutionen för systemteknik , 2005.
Informationsteknik, kryptografi, verifiering, nätverk, matematik, säkerhet, informationsteknologi, datasäkerhet, cryptography, authentication, mathematics, security, informationtechnology, computersecurity, it-security
Computer and Information Science
IdentifiersURN: urn:nbn:se:liu:diva-2688ISRN: LITH-ISY-EX--05/3690--SEOAI: oai:DiVA.org:liu-2688DiVA: diva2:20029