Non-memorizing evolutionary authentication algorithm using the preference symbols for secondary authentication

Main Article Content

KwangCheol Rim

Keywords

Preference Symbol, Secondary Authentication, Non-memorizing Password, Internal Security

Abstract

In today’s diverse society, the need to authenticate system connections and management authority is
continuously rising. Using the same password in all authentication processes is dangerous. Numerous
methods have been proposed for document security, document management, and minimization
of risk due to insiders. All these methods require secondary authentication for important documents.
Since users can only create passwords within the range of human cognitive intelligence, these are
vulnerable to attacks. This paper proposes an algorithm that generates passwords without requiring
memorization. It examines existing non-memorization type algorithms, and proposes an algorithm
that solves the disadvantages, of the inconvenience of new hardware and the cost of implementing
new infrastructure, afflicting existing algorithms. Initial data regarding individual preferences were
collected, and a statistical authentic method using these data was designed. We first examined the coincidence
of preference symbols through a survey in order to ensure statistical safety. The preference
symbols authentication algorithm was proposed based on the results of the survey. Our proposed system
for secondary authentication in internal security without memorization is convenient for users,
and provides excellent statistical security against known attacks.