Conference PaperPDF Available

Registration and Authentication Cryptosystem Using the Pentor and UltraPentor Operators

Authors:

Abstract and Figures

Any Internet banking system must solve the issues of authentication, confidentiality, integrity, and no repudiation, which means it must ensure that only qualified people can access an Internet banking account, that the information viewed remains private and can’t be modified by third parties. However, this kind of approach does not involve image encryption and their safe storage for avoiding direct compromise of the data used for authentication and identification. Other work involves the definition of a strict authentication system by introducing a multi-level authentication technique that generates a password in multilevel instances for accessing and using cloud services inside of which, an e-mail cloud service can reside as well. In our research we will present a new approach on how the cryptosystems will validate the registration and authentication process using the mathematical pentor and ultrapentor operators. The paper will be followed by a concrete example of implementation with a detailed explanation through which we will defend our approach. In this section, you will briefly describe the project / dissertation based on which this manuscript has been prepared. You can mention the motivation that led you to take up this project and its objectives.
Content may be subject to copyright.
Registration and Authentication Cryptosystem
Using the Pentor and UltraPentor Operators
1st Artan Luma
Faculty of Contemporary Sciences and
Technologies
South East European University
Tetovo, Macedonia
a.luma@seeu.edu.mk
2nd Besnik Selimi
Faculty of Contemporary Sciences and
Technologies
South East European University
Tetovo, Macedonia
b.selimi@seeu.edu.mk
3rd Blerton Abazi
Faculty of Computer Science and
Engineering
University for Business and
Technology - UBT
Prishtina, Kosovo
blerton.abazi@ubt-uni.net
Abstract Any Internet banking system must solve the issues
of authentication, confidentiality, integrity, and no repudiation,
which means it must ensure that only qualified people can access
an Internet banking account, that the information viewed remains
private and can’t be modified by third parties. However, this kind
of approach does not involve image encryption and their safe
storage for avoiding direct compromise of the data used for
authentication and identification. Other work involves the
definition of a strict authentication system by introducing a multi-
level authentication technique that generates a password in
multilevel instances for accessing and using cloud services inside
of which, an e-mail cloud service can reside as well. In our
research we will present a new approach on how the cryptosystems
will validate the registration and authentication process using the
mathematical pentor and ultrapentor operators. The paper will be
followed by a concrete example of implementation with a detailed
explanation through which we will defend our approach. In this
section, you will briefly describe the project / dissertation based on
which this manuscript has been prepared. You can mention the
motivation that led you to take up this project and its objectives.
Keywords authentication; identification; cryptosystems;
cryptography; pentor operator; ultrapentor operator; information
security; cyber attacks
I. INTRODUCTION
User authentication and identification in e-mail clients
have always represented a challenge in the Web. Email based
user authentication and identification represent emerging
techniques that appear as an alternative to the standard Public-
Key-Infrastructure (PKI) and furthermore these approaches
allow securing users from faulty impersonations and identity
thefts [1]. However, the authentication and identification
process in the web has not changed over the last twenty years
and is mainly based on password identification and cookies
[2]. The report from Google on email account security
indicates that in 2011 and 2012 there is an increase in Google
account blocking as a result of account hijacking and identity
thefts [3]. The most widely used authentication strategy
represents the text-based password scheme where users enter
their login names and passwords. Despite their popularity,
textual passwords suffer from several drawbacks. Although
simple and straightforward textual passwords are easy to
remember and maintain, they are mostly vulnerable to attacks.
While complex and arbitrary passwords render the system
substantially more secure, resisting the brute force search and
dictionary attacks, they are difficult to guard and memorize
[4].
Another aspect that advances the textual authentication is
the graphical authentication which (compared to words) is
easier to remember. Accordingly, it is difficult to formulate
and orchestrate attacks for graphical authentication
considering that the password space of graphical
authentication extends more than that of textual passwords
and makes them harder to crack and brute force attack
resistant. Still, graphical authentication suffers from the so-
called shoulder-surfing which represents a hazard of intruder
scrutinizing passwords by recording user sessions or directly
supervising the users [5]. Some other related work regarding
multilevel authentication is elaborated in [6] where the authors
propose 3-level authentication based on textual, image based
and one-time password fashion.
It has been proven that the e-banking, is a high-risk area
with a potential for substantial economic loss. The high risk
makes security a prime concern. The results indicate that U.S.
victims of phishing attacks lost five times more money in 2006
than 2005. Although 80% of the victims in 2005 got their
money back, in 2006 only 54% victims were refunded by their
banks. In the U.K., online banking fraud increased by 55%
during the first six months of 2006. It is reported that online
attacks influenced nearly 30% of online banking users; more
than 75% of those users logged in less frequently, and about
14% stopped paying bills online [16].
It is broadly known that the Internet has become an
integral part of our lives, and the proportion of people who
expect to be able to manage their bank accounts from
everywhere is constantly growing. As such, the online system
of e-banking has become a crucial component of any financial
institution’s multichannel strategy. It has been proven that
information about financial institutions, their customers, and
their transactions is, by necessity, extremely sensitive and
doing such business via a public network introduces new
challenges for security and trustworthiness.
Based on the above-mentioned research, it can be seen that
the potential of becoming an internet victim is getting higher,
and in this paper we will describe current authentications and
we will propose a new solution for user authentication as well
as how these solutions can be extended in the face of more
complex future attacks.
II. RELATED WORK
Many encryption algorithms utilized today use proprietary
methods to generate keys and therefore are useful for various
applications. Here, we introduce details for some of these
encryption algorithms. Strong side of these algorithms lies in
the length of the key that is generated and used.
RSA algorithm [8, 9], for example, is based on the generation
of two simple large numbers and , multiplied in the form
     . The algorithm also selects an encryption
International Conference on Engineering Technologies (ICENTE'18)
October 26-28,2018,Konya/TURKEY
_________________________________________________________________________________________________________________
E-ISBN: 978-605-68537-3-9
97
exponent e, as             and the
pair   is sent to the recipient. The recipient on the other
side will now generate cryptic message in the form  
. This encrypted message, then can be encrypted
after the component is found, which is easy considering
that the sender has  and  from where it finds d as
following          . Decryption
process is performed as    . The problem is
that the algorithm is based on the generation of large prime
numbers which is time consuming and computationally
intensive.
Another approach that belongs to Online authentication is the
TEA (Tiny Encryption Algorithm) [1012]. This algorithm
generates random numbers that will be sent to users that
request authentication. From this random number together
with user’s secret key, a ciphertext message is generated.
After the server receives the encrypted message, it decrypts it
using the random number sent earlier. The disadvantage of
this approach is that the secret key is previously used for
securing the communication line established between the user
and the server rather than directly for authentication. Another
aspect of this approach is that it is not clear in which way the
secret key is sent or at least generated by the user.
In addition to the above mentioned, let us present two
operators given as mathematical models called Pentor and
Ultra Pentor [13]. These operators can easily be generated
from any number and can be used for encryption purposes.
The power of the proposed cryptosystem lies in the
irreversibility trait that these two operators have during the
authentication process. Once operators are generated, it is
extremely difficult to find numbers from which these
operators are derived. This irreversible feature is used to
create online authentication scheme which uses exactly three
steps of encryption algorithm. The power of the cryptosystem
justifies the proposed approach for its potential application in
online authentication systems. In the following section, their
definitions and properties will be analyzed.
III. CRYPTOGRAPHY WITH PENTOR AND ULTRA PENTOR
OPERATORS
In [14, 15] a mathematical definition for Pentor and Ultra
Pentor is introduced. A Pentor of a number is given as an
integer number with base and for every natural and integer
number  there exists one Pentor for the given base  . In
order to represent this operator mathematically, we start from
the modular equation for Pentor of an integer number  with
base  that fulfills the condition      .
From the aforementioned conditions the following was
acquired [14]:
  
where represents the base of the integer number , 
is the Pentor of the integer number, whilst and represent
the order of the Pentor for the given integer number. The
modular expression was transformed to the equality
expression of the form:
      
      

where is an integer number that fulfills the condition for the
fraction to remain an integer number. For example, if we want
to find the Pentor of the first order than   , the Pentor
of the second order than    and so on [14].
Likewise, the UltraPentor of a number with base in
which for every natural and integer number there exists an
UltraPentor for the given base [14]. In order to represent
this operator mathematically, we start from modular equation
for UltraPentor of integer number with base that fulfills
the condition       . Considering the above
mentioned conditions, the modular equation for UltraPentor
will look like:
 
where is an integer number. The modular expression [1],
was transformed to the equality expression by applying
logarithmic operations on both sides and finding the
UltraPentor as follows:
       
    
        
where    and there is:
      
If    then UltraPentor of an integer number
with base can be written as:
      
where is an integer number that fulfills the condition for
     to be written as , where a is also an integer
number [15]. The power of the above mentioned operators lie
in their properties of irreversibility of retrieving the from
the Pentor or UltraPentor itself which in our designed
cryptosystem is kept secret on the user’s side.
IV. CRYPTOSYSTEM ALGORITHM FOR REGISTRATION
(CERTIFICATION) AND AUTHENTICATION
At the beginning we will give some basic concepts for
designing a new cryptosystem for registration (certification)
and authentication. This cryptosystem will be based on
mathematical operators known as Pentor and UltraPentor. As
far as these two operators are concerned, we have clarified all
the concepts for them at the previous section.
Now based on a scheme we will try to clarify the
registration process (certification) of this new cryptosystem,
as it is shown on the following figure:
Fig. 1 Registration (certification)
International Conference on Engineering Technologies (ICENTE'18)
October 26-28,2018,Konya/TURKEY
_________________________________________________________________________________________________________________
E-ISBN: 978-605-68537-3-9
98
From Fig. 1, it is clear that the client will be able to register
(certify) by making a request to ID Server, where along with
the request will also must enter the that shortly
we will make it with . Then the ID Server will receive a
random number from the list provided, which will also be the
secret key of the client and we will mark it with . In the
same time, we define the order of Pentor and UltraPentor
where we will mark it . After we have defined , now we
can begin the calculations of the Pentor and Ultrapentor
operators. Once these are calculated by ID Server on the server
base they will be saved as  ,  and , where and
are the secret key of the client. The ID Server will calculate
the function   and will add the , with the
couple of  (certificate) will be sent to the client.
Now these data, the client can be transferred/sent in
various forms such as: certificate on USB, CD/DVD, etc. In
this form the third party is not able to get information for the
client. So, the registration process (certification) ends here.
Now we will explain the authentication process based on
the following schema:
Fig. 2 Authentification
The client calculates the function   
and will add the , where during the calculation it takes a
random number. Then, the client sends the couple of numbers
 , to the Server ID, where the server ID will need to
authenticate the client. Than it will happen an pentor attack
with pentor operator to the function and according to
the pentor attach algorithm in the end of the process a value is
gained which we will store at the variable. Now this value
must be fulfilled with , and if it is that the ID Server has
authenticated the client and gives access to the system,
otherwise if will be rejected.
V. CASE STUDY
Now we will show how the client's registration in the new
cryptosystem will be realized. Now, the client will be able to
register (certify) by making a request to ID Server, where
along with the request will add also the  
  that shortly we will mark it as . This value will
need to be converted based on ASCII code from text to
number and we will have   
, so   . Then ID
Server will receive a random number from the list provided,
which will also be the secret key of the client and we will
mark it with , ku . We also define the order of
Pentor and UltraPentor where we will mark it with  , so
  . After we have defined , now we can begin with the
calculations of the Pentor and UltraPentor.
Calculation of Pentor is done based on the formula:
   
Where ,    and   .
Now, we'll count the client's Pentor:
    

  
So, the pentor of the client will be
4.
And UltraPentor calculations are made based on the formula:

   
Where  and  10.
Now, we'll count the UltraPentor of the client:

    
So the client UltraPentor will be 
 .
Once Pentori and UltraPentor have been calculated they will
be saved by ID Server on base as  ,  and , where
and are the clients secret key. ID Server will make you
calculate a function    and will add the , and
the couple of  (certificate) and will sent all together
to the client.
The function   will be calculated as in the
following:
    
   
 
Now, when the UltraPentor has the value of 
 , then
we function value we gained we will divide by six digits
from left to right as the following:
 
Now we sum up these values as follows:
    
As the result of the function there are still more than six
figures that we continue with his cutting, as follows:
  
Now we sum up these values as follows:
    
 
Now from this value by shifting the figures we will get
some combinations and the following:




where zero is replaced by  and we get 



Now from all these combinations we choose one or
random as a client function .
International Conference on Engineering Technologies (ICENTE'18)
October 26-28,2018,Konya/TURKEY
_________________________________________________________________________________________________________________
E-ISBN: 978-605-68537-3-9
99
The client certificate will be from these parameters as
follows:

  
Now these data, the client can be sent in various forms
such as: certificate on USB, CD/DVD, Cloud etc. In this form
the third party is not able to get information for the client. So,
the registration process (certification) ends.
Now we will explain the authentication process. The client
calculates the function    and will add
the , where in the calculation take a random number.
The function    will be calculated as
in the following:
     
   
    
Now that UltraPentor has value 
 , then the value
gained in the function  divide by six digits from left to right
as the following:
    
Since it was the first digit of the value  is zero
then zero is replaced by  and we get the value of

    
Now we sum up these values as follows:
  
  
As the result of the function  there are still more than
six figures that we continue with his cutting, as follows:
   
Now we sum up these values as follows:
     
  
Now from this value by shifting the figures we will get
some combinations and the following:






Now from all these combinations we choose one whom we
want or random as a client function .
Then, the client sends the the  
, to the ID Server, where the
ID Server will need to authenticate the client. The function
will be have a Pentor Attack with the Pentor operator  
and according to the Pentor Attack algorithm, in the end a
value is gained to store on the variables  .
The Pentor Attach will happen as following:
  


  


  


  


  


  



So, the variable is  .
Now, this value must be fully versatile with , and
if it is than the ID Server has authenticated the client and the
client will gain access to the system, otherwise the system will
reject the request.
In our concrete case we will have the following result:


which means that the ID Server has authenticated the client
and gives access to the relevant client system.
VI. CONCLUSIONS
In this paper we have presented a completely new
cryptographic algorithm as well as cryptosystem that use this
algorithm for online user authentication. From the numeric
examples it has been shown that the cryptosystem fully works
and can be implemented in many applications where highly
secured user transactions required.
Other important aspect is that the authentication does not
need an encryption key for the process itself, but it can be used
additionally for line security (encryption) considering that
user might use regular unsecured internet line.
The future work would involve creating an online user
authentication page that would use our proposed algorithm in
real life applications. Some work has already started and
results will follow soon.
REFERENCES
[1] S.L. Garfinkel, E-mail based authentication and
identification: an alternative to PKI. IEEE Comput. Soc. 1(6),
2026 (2003).
[2] M. Dietz, A. Czeskis, D.S. Wallach, D. Balfanz, Origin-
bound certificates: a fresh approach to strong client
authentication for the web, in Proceedings of the 21st Usenix
Security Symposium, 2012.
[3] M. Hern, An update on our war against account hijackers.
The Google Blog (2013). Available via GOOGLE Online
Security.
http://googleonlinesecurity.blogspot.com/2013/02/an-
International Conference on Engineering Technologies (ICENTE'18)
October 26-28,2018,Konya/TURKEY
_________________________________________________________________________________________________________________
E-ISBN: 978-605-68537-3-9
update-on-our-war-against-account.html of subordinate
document. Cited 15 June 2013.
[4] S. Balaji, Authentication techniques for engendering
session passwords with colors and text. Adv. Inf. Technol.
Manage. 1(2), 7178 (2012).
[5] H. Zhao, X. Li, S3PAS: a scalable shoulder-surfing
resistant textual-graphical password authentication scheme,
in 21st International Conference on Advanced Information
Networking and Applications Workshops (AINAW 07)
(2007), pp. 467472.
[6] S. Anand, P. Jain, Nitin, R. Rastogi, Security analysis and
implementation of 3-level security system using image based
authentication, in Computer Modelling and Simulation
(UKSim) (2012), pp. 547552.
[7] H.A. Dinesha, V.K. Agrawal, Multi-level authentication
technique for accessing cloud services, in International
Conference on Computing, Communication and Applications
(ICCCA) (2012), pp. 14.
[8] R. Rivest, A. Shamir, L. Adleman, A method for obtaining
digital signatures and public-key cryptosystems. Commun.
ACM 21(2), 120126 (1978).
[9] D. Boneh, Twenty years of attacks on the RSA
cryptosystem. Not. Am. Math. Soc. 46(2), 203213 (1999).
[10] D.J. Wheeler, R.M. Needham, TEA, a tiny encryption
algorithm. Lecture Notes in Computer Science (LNCS)
(Leuven, Belgium: Fast Software Encryption: Second
International Workshop), vol. 1008 (1994), pp. 363366.
[11] J. Kelsey, B. Schneier, D. Wagner, Related-key
cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X
NewDES, RC2, and TEA. Lecture Notes in Computer
Science (LNCS) vol. 1334 (1997), pp. 233246.
[12] A. Bogdanov, M. Wang, Zero-correlation linear
cryptanalysis with reduced data complexity. Lecture Notes in
Computer Science (LNCS) (Fast Software Encryption 2012),
vol. 7549 (2012), pp. 2948.
[13] A. Luma, B. Ismaili, B. Raufi, Multilevel user
authentication and identification scheme for email clients. in
Proceedings of the world congress on engineering, WCE
2013, 35 July 2013. Lecture notes in engineering and
computer science, London, UK (2013), pp. 12211225.
[14] A. Luma, B. Raufi, New data encryption algorithm and
its implementation for online user authentication, in
International Conference on Security and Management,
(CSREA Press, USA, 2009), pp. 8185.
[15] A. Luma, B. Raufi, Xh Zenuni, Asymmetric encryption
decryption with Pentor and ultra Pentor operators. Online J.
Sci. Technol. (TOJSAT) 2(2), 912 (2012).
[16] M. Hertzum, J. N. Christian, N. Jørgensen and M.
Nørgaard, Usable Security and E-Banking: ease of use vis-a-
vis security J. Australasian Journal of Information Systems.
11, 2, 2004.
International Conference on Engineering Technologies (ICENTE'18)
October 26-28,2018,Konya/TURKEY
_________________________________________________________________________________________________________________
E-ISBN: 978-605-68537-3-9
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Finding new approaches for asymmetric encryption / decryption process represents a milestone in cryptographic research and development. In this paper we introduce new algorithm for asymmetric encryption by utilizing two mathematical operators called Pentors and Ultra Pentors. The public and private key in this algorithm represent a quadruple of parameters which are directly dependent from the above mentioned operators. The strength of the algorithm resides in the inability to find the respective Pentor and Ultra Pentor operator from the mentioned parameters. http://www.tojsat.net/index.php/tojsat/article/view/35
Conference Paper
Full-text available
Cloud computing is an emerging, on-demand and internet- based technology. It provides variety of services over internet such as, software, hardware, data storage and infrastructure. This technology has been used by worldwide customers to improve their business performance. However, to utilize these services by authorized customer, it is necessary to have strict authentication check. At present, authentication is done in several ways: such as, textual, graphical, bio-metric, 3D password and third party authentication. This paper presents the strict authentication system by introducing the multi-level authentication technique which generates/authenticates the password in multiple levels to access the cloud services. In this paper, details of proposed multilevel authentication technique are presented along with the architecture, activities, data flows, algorithms and probability of success in breaking authentication.
Conference Paper
Full-text available
Most of the encryption algorithms used today generate huge cipher messages as well as long encryption keys. These approaches require time and are computationally intensive. In this paper we introduce two operators, represented as mathematical models called Pentor and Ultra Pentor. These operators can be easily generated out of any number and can be used for encryption purposes. The strength of the cryptosystem proposed here lies in the irreversible property that these two operators have during the authentication process. Once the operators have been generated, it is extremely burdensome to find the numbers out of which these operators have been generated. This irreversible property has been used for creation of online authentication scheme that uses a genuine three step encryption algorithm. The strength of the proposed cryptosystem disserts the possible applications in online authentication systems.
Article
Full-text available
Electronic banking must be secure and easy to use. An evaluation of six Danish web-based electronic banking systems indicates that the systems have serious weaknesses with respect to ease of use. Our analysis of the weaknesses suggests that security requirements are among their causes and that the weaknesses may in turn cause decreased security. We view the conflict between ease of use and security in the context of usable security, a concept that is intended to match security principles and demands against user knowledge and motivation. Automation, instruction, and understanding can be identified as different approaches to usable security. Instruction is the main approach of the systems evaluated; automation relieves the user from involvement in security, as far as possible; and understanding goes beyond step-by-step instructions, to enable users to act competently and safely in situations that transcend preconceived instructions. We discuss the pros and cons of automation and understanding as alternative approaches to the design of web-based e-banking systems.
Conference Paper
Full-text available
The vulnerabilities of the textual password have been well known. Users tend to pick short passwords or passwords that are easy to remember, which makes the passwords vulnerable for attackers to break. Furthermore, textual password is vulnerable to shoulder-surfing, hidden-camera and spyware attacks. Graphical password schemes have been proposed as a possible alternative to text-based scheme. However, they are mostly vulnerable to shoulder-surfing. In this paper, we propose a Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme (S3PAS). S3PAS seamlessly integrates both graphical and textual password schemes and provides nearly perfect resistant to shoulder-surfing, hidden-camera and spyware attacks. It can replace or coexist with conventional textual password systems without changing existing user password profiles. Moreover, it is immune to brute-force attacks through dynamic and volatile session passwords. S3PAS shows significant potential bridging the gap between conventional textual password and graphical password. Further enhancements of S3PAS scheme are proposed and briefly discussed. Theoretical analysis of the security level using S3PAS is also investigated.
Conference Paper
Client authentication on the web has remained in the internet-equivalent of the stone ages for the last two decades. Instead of adopting modern public-key-based authentication mechanisms, we seem to be stuck with passwords and cookies. In this paper, we propose to break this stalemate by presenting a fresh approach to public-key-based client authentication on the web. We describe a simple TLS extension that allows clients to establish strong authenticated channels with servers and to bind existing authentication tokens like HTTP cookies to such channels. This allows much of the existing infrastructure of the web to remain unchanged, while at the same time strengthening client authentication considerably against a wide range of attacks. We implemented our system in Google Chrome and Google's web serving infrastructure, and provide a performance evaluation of this implementation.
Article
Increasing security has always been an issue since Internet and Web Development came into existence, text based passwords is not enough to counter such problems, which is also an anachronistic approach now. Therefore, this demands the need for something more secure along with being more user-friendly. Therefore, we have tried to increase the security by involving a 3-level security approach, involving text based password at Level 1, Image Based Authentication at Level 2, and automated generated one-time password (received through an automated email to the authentic user) at Level 3. And an assiduous effort has been done for thwarting Shoulder attack, Tempest attack, and Brute-force attack at client side, through the use of unique image set in the IBA System.
Article
An encryption method is presented with the novel property that publicly re- vealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: 1. Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intended recipient. Only he can decipher the message, since only he knows the corresponding decryption key. 2. A message can be \signed" using a privately held decryption key. Anyone can verify this signature using the corresponding publicly revealed en- cryption key. Signatures cannot be forged, and a signer cannot later deny the validity of his signature. This has obvious applications in \electronic mail" and \electronic funds transfer" systems. A message is encrypted by representing it as a number M, raising M to a publicly specied