liu.seSearch for publications in DiVA
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Strong user authentication mechanisms
Linköping University, Department of Electrical Engineering.
2005 (English)Independent thesis Basic level (professional degree)Student thesisAlternative title
Starka användarverifieringsmekanismer (Swedish)
Abstract [en]

For Siemens Industrial Turbomachinery to meet its business objectives a modular authentication concept has to be implemented. Such a mechanism must be cost- effective while providing a well-balanced level of security, easy maintenance and be as user-friendly as possible.

Authenticating users securely involves the combination of two fields, theory of authentication mechanisms in information systems and human computer interaction. To construct a strong user authentication system the correlations of these fields has to be understood and provide guidance in the design.

Strong user authentication mechanisms enforce the use of two-factor authentication or more. The combinations implemented rely on knowledge, possession and sometimes logical-location.

A user authentication system has been implemented using leading industrial products as building blocks glued together with security analysis, programming and usability research.

The thesis is divided into two parts, the first part giving the theoretical background of cryptography, authentication theory and protocols needed for the understanding of the second part, providing security analysis, blueprints, and detailed discussions on the implemented system.

Conclusions have been drawn regarding the implemented system and its context as well as from strict theoretical reasoning regarding the authentication field in general. Conclusions include:

· The unsuitability of remote authentication using biometrics

· The critical importance of client security in remote authentication

· The importance of a modular structure for the security of complex network-based systems

Place, publisher, year, edition, pages
Institutionen för systemteknik , 2005.
Keyword [en]
Informationsteknik, kryptografi, verifiering, nätverk, matematik, säkerhet, informationsteknologi, datasäkerhet, cryptography, authentication, mathematics, security, informationtechnology, computersecurity, it-security
Keyword [sv]
Informationsteknik
National Category
Computer and Information Science
Identifiers
URN: urn:nbn:se:liu:diva-2688ISRN: LITH-ISY-EX--05/3690--SEOAI: oai:DiVA.org:liu-2688DiVA: diva2:20029
Uppsok
teknik
Available from: 2005-02-14 Created: 2005-02-14

Open Access in DiVA

fulltext(2121 kB)2242 downloads
File information
File name FULLTEXT01.pdfFile size 2121 kBChecksum MD5
773c0d90d39a043b8afb4e73615e6205e80aa4add62491a73de5fdb1b340b55f0bb8b8df
Type fulltextMimetype application/pdf

By organisation
Department of Electrical Engineering
Computer and Information Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 2242 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 1019 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf