Abstract
Authentication is the act of confirming the validity of someone's personal data. In the traditional authentication system, username and password are sent to the server for verification. However, this scheme is not secure, because the password can be sniffed. In addition, the server will keep the user's password for the authentication. This makes the system vulnerable when the database server is hacked. Zero knowledge authentication allows server to authenticate user without knowing the user's password. In this research, this scheme was implemented with Guillou-Quisquater protocol. Two login mechanisms were used: file-based certificate with key and local storage. Testing phase was carried out based on the Open Web Application Security Project (OWASP) penetration testing scheme. Furthermore, penetration testing was also performed by an expert based on Acunetix report. Three potential vulnerabilities were found and risk estimation was calculated. According to OWASP risk rating, these vulnerabilities were at the medium level.
Author supplied keywords
Cite
CITATION STYLE
Kusnardi, K., & Gunawan, D. (2019). Guillou-quisquater protocol for user authentication based on zero knowledge proof. Telkomnika (Telecommunication Computing Electronics and Control), 17(2), 826–834. https://doi.org/10.12928/TELKOMNIKA.V17I2.11754
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.