Affiliation:
1. Computer Science Department, Texas Tech University, Lubbock, TX 79409, USA
Abstract
Authentication in the digital landscape faces persistent challenges due to evolving cyber threats. Traditional text-based passwords, which are vulnerable to various attacks, necessitate innovative solutions to fortify user systems. This paper introduces the RoseCliff Algorithm, which is a dual authentication mechanism designed to enhance resilience against sophisticated hacking attempts and to continuously evolve stored passwords. The study explores encryption techniques, including symmetric, asymmetric, and hybrid encryption, thereby addressing the emerging threats posed by quantum computers. The RoseCliff Algorithm introduces introduces dynamism into passwords that allows for more secured communication across multiple platforms. To assess the algorithm’s robustness, potential attacks such as brute force, dictionary attacks, man-in-the-middle attacks, and machine learning-based attacks are examined. The RoseCliff Algorithm, through its dynamic password generation and encryption methodology, proves effective against these threats. Usability evaluation encompasses the implementation and management phase, focusing on seamless integration, and the user experience, emphasizing clarity and satisfaction. Limitations are acknowledged, thus urging further research into encryption technique resilience, robustness against breaches, and the integration of emerging technologies. In conclusion, the RoseCliff Algorithm emerges as a promising solution, thereby effectively addressing the complexities of modern authentication challenges and providing a foundation for future research and enhancements in digital security.
Reference41 articles.
1. Papathanasaki, M., Maglaras, L., and Ayres, N. (2022). Modern authentication methods: A comprehensive survey. AI Comput. Sci. Robot. Technol., 1–24.
2. A Review Of Authentication Methods;Lal;Int. J. Sci. Technol. Res.,2016
3. Konoth, R.K., van der Veen, V., and Bos, H. (2017). How anywhere computing just killed your phone-based two-factor authentication. Financ. Cryptogr. Data Secur., 405–421.
4. (2024, January 01). 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ ATC/CBDCOM/IOP/SCI). Available online: https://ieeexplore.ieee.org/xpl/conhome/8386711/proceeding.
5. Towhidi, F., Manaf, A.A., Daud, S.M., and Lashkari, A.H. (2011, January 18–21). The Knowledge Based Authentication Attacks. Proceedings of the International Conference on Security and Management (SAM), Las Vegas, NV, USA.