A survey on Response Computaion Authentication techniques.

Main Article Content

Usha Sunil Gound, Prof. Tanaji A.Dhaigude, Shweta Satish Kadam, Avinash Shivaji Gaikwad

Abstract

as we know the problems regarding data and system security are challenging and taking attraction of researchers. Although there are many techniques available which offers protection to systems there is no single Method which can provide full protection. As we know to provide security to system authentication in login system is main issue for developers. Response Computable Authentication is two way methods which are used by number of authentication system where an authentication system independently calculates the expected user response and authenticates a user if the actual user response matches the expected value. But such authentication system have been scare by malicious developer who can bypass normal authentication by covering logic in source code or using weak cryptography. This paper mainly focuses on RCA system to make sure that authentication system will not be influenced by backdoors. In this paper our main goal is to take review of different methods, approaches and techniques used for Response Computation Authentication.

Article Details

How to Cite
, U. S. G. P. T. A. S. S. K. A. S. G. (2014). A survey on Response Computaion Authentication techniques. International Journal on Recent and Innovation Trends in Computing and Communication, 2(11), 3587–3590. https://doi.org/10.17762/ijritcc.v2i11.3515
Section
Articles