Evaluation Of Basic Knowledge Should Be Mastered For Good Understanding And Pointing

1987 WordsMay 23, 20168 Pages
The reminder of this thesis has been organized as follows. Chapter 2 reviews a general overview of basic knowledge should be mastered for good understanding and pointing out the key points of desired attributes as well. Furthermore, possible malicious attacks have been briefly defined and the threat model adopted also reviewed in a brief which helps to know what the environment conditions could be and what is the ability of an attacker to gain secret information. Then after, how an attacker can use these information to perform an attacks. In chapter 3 we first examine recent existing Li et al’s scheme and pointed out weaknesses of their scheme. Then as a solution to overcome their scheme faults, we show our proposed authentication scheme…show more content…
In addition, we produce a quick review of the security functionality of ideal authentication schemes, possible malicious attacks. As well as reviewing some mathematical basics which helps understanding the existing schemes and figure out their drawbacks. 2.1 Overview of Information Security As the online services offered through internet has progressed and computing systems have become much more complex, security and privacy issues have become essential. Generally, Information system security should be able to provide user’s confidentiality, data integrity, data availability whenever a legitimate user wishes to access, in this context security can be divided into four areas as follows: Confidentiality, Integrity, Authentication and Non-Repudiation [23]. 2.1.1 Confidentiality Confidentiality or privacy can be defined as ensuring that, data is only shared with those users who are authorized to access it. Confidentiality aspect considered as one of the cornerstones and should be contained in any information security policy. Without confidentiality, the content of information system can be compromised by those who are unauthorized to access and thus could reveal information about a user. Confidentiality or privacy achieved using data encrypting technique during transmission. So that, an adversary cannot read the data even he can intercept it during transmission over channel. 2.1.2 Integrity Integrity refers to trustworthy of the data to
Open Document