KYPS

Last updated
A sketch of the KYPS login method. The user's password is not disclosed to the computer he uses. It is, however, disclosed to the KYPS server. The system therefore requires that the user trusts the provider of the service Login.gif
A sketch of the KYPS login method. The user's password is not disclosed to the computer he uses. It is, however, disclosed to the KYPS server. The system therefore requires that the user trusts the provider of the service

KYPS (Keep Your Password Secret) is a free web-based service that enables users to log into websites, which usually require a username/password combination, using one-time passwords. The main difference between KYPS and similar password management technologies is that the password is never disclosed to the local computer. This makes KYPS effective against password theft by spyware or keyloggers, particularly when using public computers such as in an Internet cafe. [1]

Contents

More details about the internal workings of KYPS were published at the CSIE 2009 conference. [1] KYPS is also featured on Makeuseof, [2] and heise.de [3] Some of the internal workings of its predecessor, an open-source project called "Impostor", [4] were published at the peer-reviewed GLOBECOM conference in 2004. [5]

See also

Related Research Articles

A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key can be different sizes and varieties, but in all cases, the strength of the encryption relies on the security of the key being maintained. A key's security strength is dependent on its algorithm, the size of the key, the generation of the key, and the process of key exchange.

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program. A keystroke recorder or keylogger can be either software or hardware.

<span class="mw-page-title-main">Onion routing</span> Technique for anonymous communication over a computer network

Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to the layers of an onion. The encrypted data is transmitted through a series of network nodes called "onion routers," each of which "peels" away a single layer, revealing the data's next destination. When the final layer is decrypted, the message arrives at its destination. The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes. While onion routing provides a high level of security and anonymity, there are methods to break the anonymity of this technique, such as timing analysis.

Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet is an inherently insecure channel for information exchange, with high risk of intrusion or fraud, such as phishing, online viruses, trojans, ransomware and worms.

<span class="mw-page-title-main">One-time password</span> Password that can only be used once

A one-time password (OTP), also known as a one-time PIN, one-time authorization code (OTAC) or dynamic password, is a password that is valid for only one login session or transaction, on a computer system or other digital device. OTPs avoid several shortcomings that are associated with traditional (static) password-based authentication; a number of implementations also incorporate two-factor authentication by ensuring that the one-time password requires access to something a person has as well as something a person knows.

The International Packet Switched Service (IPSS) was the first international and commercial packet switching network. It was created in 1978 by a collaboration between Britain's Post Office Telecommunications, and the United States' Western Union International and Tymnet.

The International Conference on Communications (ICC) is an annual international academic conference organised by the Institute of Electrical and Electronics Engineers' Communications Society. The conference grew out of the Global Communications Conference (GLOBECOM) when, in 1965, the seventh GLOBECOM was sponsored by the Communications Society's predecessor as the "IEEE Communications Convention". The following year it adopted its current name and GLOBECOM was disbanded. The conference was held in the United States until 1984 when it was held in Amsterdam; it has since been held in several other countries.

Virtual output queueing (VOQ) is a technique used in certain network switch architectures where, rather than keeping all traffic in a single queue, separate queues are maintained for each possible output location. It addresses a common problem known as head-of-line blocking.

<span class="mw-page-title-main">Mohammad S. Obaidat</span> American computer scientist

Mohammad Salameh Obaidat is a Jordanian American Academic/ Computer Engineer/computer Scientist and Founding Dean of College of Computing and Informatics at the University of Sharjah, UAE. He is the Past President & Chair of Board of Directors of and a Fellow of the Society for Modeling and Simulation International (SCS), and a Fellow of the Institute of Electrical and Electronics Engineers (IEEE) for contributions to adaptive learning, pattern recognition and system simulation . He was born in Jordan to The Obaidat known Family. He is the cousin of the Former Prime Minister of Jordan, Ahmed Obaidat and received his M.S. and Ph.D. in computer engineering from the Ohio State University, Columbus, Ohio, USA. He is known for his contributions in the fields of cybersecurity, Biometrics-based Cybersecurity, wireless networks, modeling and simulation, AI/Data Analytics. He served as President and Char of Board of Directors of the Society for Modeling and Simulation International, SCS, a Tenured Professor & Chair of Department of Computer Science at Monmouth University, Tenured Professor & Chair of Department of computer and Information Sciences at Fordham University, USA, Dean of College of Engineering at Prince Sultan University, and Advisor to the President of Philadelphia University for Research, Development and IT. He has chaired numerous international conferences and has given numerous keynote speeches.

<span class="mw-page-title-main">Elie Bursztein</span> French computer scientist (born 1980)

Elie Bursztein, born 1 June 1980 in France, is a French computer scientist and software engineer. He is currently Google and DeepMind AI cybersecurity technical and research lead.

Cyber crime, or computer crime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the Internet. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, identity theft, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.

<span class="mw-page-title-main">Gregory Raleigh</span>

Gregory “Greg” Raleigh, is an American radio scientist, inventor, and entrepreneur who has made contributions in the fields of wireless communication, information theory, mobile operating systems, medical devices, and network virtualization. His discoveries and inventions include the first wireless communication channel model to accurately predict the performance of advanced antenna systems, the MIMO-OFDM technology used in contemporary Wi-Fi and 4G wireless networks and devices, higher accuracy radiation beam therapy for cancer treatment, improved 3D surgery imaging, and a cloud-based Network Functions Virtualization platform for mobile network operators that enables users to customize and modify their smartphone services.

IEEE Cloud Computing is a global initiative launched by IEEE to promote cloud computing, big data and related technologies, and to provide expertise and resources to individuals and enterprises involved in cloud computing.

Pamela Zave is an American computer scientist now working at Princeton University. She is known for her work on requirements engineering, telecommunication services, and protocol modeling and verification, and is now working on network architecture. She was named a Fellow of the Association for Computing Machinery in 2001, and was the 2017 recipient of the Harlan D. Mills Award from the IEEE Computer Society.

Usability of web authentication systems refers to the efficiency and user acceptance of online authentication systems. Examples of web authentication systems are passwords, federated identity systems, email-based single sign-on (SSO) systems, QR code-based systems or any other system used to authenticate a user's identity on the web. Even though the usability of web authentication systems should be a key consideration in selecting a system, very few web authentication systems have been subjected to formal usability studies or analysis.

<span class="mw-page-title-main">Xi Zhang (professor)</span> Chinese Professor of Electrical and Computer Engineering

Xi Zhang is a Full Professor and the Founding Director of the Networking and Information Systems Laboratory, Department of Electrical and Computer Engineering, Texas A&M University. He is a Fellow of the IEEE for contributions to quality of service (QoS) in mobile wireless networks. His research interests include statistical delay-bounded QoS provisioning for multimedia mobile wireless networks, edge computing, finite blocklength coding theory, in-network caching, and offloading over 5G mobile wireless networks.

Internet security awareness or Cyber security awareness refers to how much end-users know about the cyber security threats their networks face, the risks they introduce and mitigating security best practices to guide their behavior. End users are considered the weakest link and the primary vulnerability within a network. Since end-users are a major vulnerability, technical means to improve security are not enough. Organizations could also seek to reduce the risk of the human element. This could be accomplished by providing security best practice guidance for end users' awareness of cyber security. Employees could be taught about common threats and how to avoid or mitigate them.

Passwordless authentication is an authentication method in which a user can log in to a computer system without the entering a password or any other knowledge-based secret. In most common implementations users are asked to enter their public identifier and then complete the authentication process by providing a secure proof of identity through a registered device or token.

<span class="mw-page-title-main">Raheem Beyah</span> American computer engineer

Raheem Beyah is an American computer engineer, researcher, and educator. As of January 15, 2021 he is the Dean of the College of Engineering and Southern Company Chair at the Georgia Institute of Technology. Prior to becoming the Dean, he was the vice president for Interdisciplinary Research and the Motorola Foundation Professor and the executive director of Georgia Tech's online masters in cyber security program. Beyah is also the co-founder and chair of industrial security company Fortiphyd Logic, Inc.

<span class="mw-page-title-main">Brij B. Gupta</span> Indian professor

Brij Bhooshan Gupta is a Distinguished professor with the Department of Computer Science and Information Engineering (CSIE), Asia University, Taiwan. He has published over 500 papers in journals/conferences including 30 books and 10 Patents with over 25,000 citations. He has also received numerous national and international awards including Clarivate Highly Cited Researcher in the world in Computer Science consecutively in year 2022 and 2023.

References

  1. 1 2 Pashalidis, Andreas (2009). "2009 WRI World Congress on Computer Science and Information Engineering". WRI World Congress on Computer Science and Information Engineering. CSIE 2009. pp. 66–70. doi:10.1109/CSIE.2009.910. ISBN   978-0-7695-3507-4.
  2. "MakeUseOf Article". Archived from the original on 2009-04-23. Retrieved 2009-08-11.
  3. Heise.de Entry
  4. "Impostor web proxy". Impostor.sf.net. Retrieved 2022-05-06.
  5. Pashalidis, A.; Mitchell, C. J. (2004). "IEEE Global Telecommunications Conference, 2004. GLOBECOM '04". IEEE Global Telecommunications Conference, 2004. GLOBECOM '04. Vol. 4. pp. 2191–2195. doi:10.1109/GLOCOM.2004.1378398. ISBN   0-7803-8794-5.