Heuristic authentication protocol for TCP/IP network applications under UNIX

  • Authors:
  • A. H. Wadaa;H. M. Abdel-Wahab;John McHugh

  • Affiliations:
  • Old Dominion University, Norfolk, Virginia;Old Dominion University, Norfolk, Virginia;UNC-Chapel Hill, Chapel Hill, N.C.

  • Venue:
  • ACM-SE 30 Proceedings of the 30th annual Southeast regional conference
  • Year:
  • 1992

Quantified Score

Hi-index 0.00

Visualization

Abstract

Networking has brought about the potential of distributed applications to the user. Typically in such applications there are several different interacting processes that run in multiple hosts and communicate across the network for exchanging data and exercising control. Authentication is an intrinsic activity in the context of distributed applications. A server process has to authenticate a client process, possibly running on another network, prior to granting service to that client. A password in clear text might be sent across the network for this purpose, thus endangering the system security. We propose a heuristic protocol, as an alternative approach to the authentication problem. One important characteristic of our protocol is that its success can only be asserted in a probabilistic manner, nevertheless its probability of success, in any given authentication session, can be arbitrarily increased. The major advantage, however, is that no clear text copy of a password need ever be stored or exchanged across the network under the proposed protocol.