OTENTIKASI PASSWORD PENGGUNA MENGGUNAKAN ZERO KNOWLEDGE PROTOCOL

Nugroho, Sandromedo Christa and Rahmawati , Wahyu Indah (2012) OTENTIKASI PASSWORD PENGGUNA MENGGUNAKAN ZERO KNOWLEDGE PROTOCOL. Prosiding Seminar Nasional Teknologi Informasi dan Multimedia 2012 (SNASTIA 2012), 3. C23-C26. ISSN 1979-3960

[thumbnail of Nugroho_Otentikasi Password_Abstratc_2012.pdf]
Preview
PDF
Nugroho_Otentikasi Password_Abstratc_2012.pdf - Published Version

Download (21kB) | Preview
[thumbnail of Nugroho_Otentikasi Password_References_2012.pdf]
Preview
PDF
Nugroho_Otentikasi Password_References_2012.pdf - Published Version

Download (16kB) | Preview

Abstract

Globalization has an impact on the development of science and technology, where the mentioned development also given impact to the development of information security. Information security has 3 (three) main aspects, among others confideality, integrity, and authentication. Authentication is a process that ensures that both parties believe (with evidence) the identity of the first party. There are several ways to perform authentication, like using something known, something possessed, and something inherent. Practically, authentication is generally done by using password that consists of 6 (six) to 10 (ten) characters. The use of passwords in authenticated user have less secure and weaker, beside that there are some attacks that can be applied by the use of password for authentication, including replays of fixed passwords, passwords exhaustive search, and password-guessing and dictionary attacks. The use of passwords also has some drawbacks, among others a person tends to be difficult to remember long passwords, where password generally consist of date or things that are easy to remember and liked by the user, making it easier for an unauthorized person to guess the password. One solution that can be used to address the weaknesses found in the use of passwords as an authentication is by using the Zero Knowledge Protocol.

Item Type: Article
Uncontrolled Keywords: Information Security, Authentication, Password, Zero Knowledge Protocol
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Depositing User: Eko Setiawan 194014
Date Deposited: 09 May 2012 02:43
Last Modified: 24 Mar 2021 14:19
URI: http://repository.ubaya.ac.id/id/eprint/453

Actions (login required)

View Item View Item