6 OPTIMAL WEB SECURITY-
AND-PERFORMANCE INDEX
FOR THE HYBRID
AUTHENTICATION SYSTEM
From the above discussions, it is obvious that
performance and security are two opposing
dependability attributes. For example, if the random
seed length is excessive (which is good for security
reasons), system performance will be reduced
tremendously, as mentioned in (D. Eastlake et al.,).
This points to the need for a compromise between
performance and security for our hybrid
authentication system. To this end, using
Performance Index (PI) and Security Index (SI)
defined in Sections 4 and 5 respectively, we propose
a composite index called Authentication System
Index (ASI), which is defined as follows:
ASI = PI x SI.
Using the ASI, we are able to find an optimal set of
the parameters used in our hybrid authentication
system, in terms of both security and system
performance. Table 5 gives a snapshot of the results
involving ASI. By analysing all the data (not
included here because of space constraints), we are
able to list down the following observations for our
hybrid authentication system:
1. The random-seed size of 1000 bytes is too large,
which reduces the ASI value. A seed size of 500
(or 100) bytes may give optimal ASI.
2. The nonce size of 20 bytes is too small. A size of
100 (or 50) bytes may produce optimal ASI.
3. For optimal ASI, the number of random seeds
used can be just one.
7 CONCLUSION
In this paper, we have presented a quantitative
analysis on the web security and system
performance evaluation of an actual hybrid
authentication system. We have proposed a
composite index called Authentication System Index
(ASI), which can be used to evaluate at the same
time both the security and performance of our hybrid
authentication system.
From the results obtained, we have found that: (i) a
nonce size of either 50 or 100 bytes is fine for
optimal security and system performance; this
concurs with the findings presented in (D. Eastlake
et al.,); (ii) it is claimed in (D. Eastlake et al.,) that
1000 bytes for the size of the seeds used seem too
large, and our study in this paper proves this point;
our results show 100 (or 500) bytes is a good seed
size to be used for our authentication system, and
(iii) the number of seeds used (i.e. frequency of
seeding the public-key encryption) can be just once,
which would give sufficient randomness.
REFERENCES
A Joy and B Soh, “A proposed secure TCP connection-
oriented model for e-commerce systems,” Proceedings
of International Conference on Internet and
Multimedia Systems and Applications, Hawaii, Aug
12-14, pp 68-73, 2002.
C. Kaufman, R. Perlman, and M. Speciner. Network
Security Private Communications in a Public World,
Prentice Hall 1995.
A. Jones, “Password authentication with insecure
communication,” ACM Communications, vol. 24,
number 11, 1981, pp 12-21.
N.Haller, C. Metz, P. Nesser, and M. Straw . “A One-
Time Password System,” RFC2289, February 1998,
http://www.ietf.org.
C. I’Anson and C. Mitchell. “Security defects in CCITT
recommendation X.509 – The directory authentication
framework,” Computer Communications Review, pp
45-53, April 1990.
A. Menezes, P. van Oorschot and S. Vanstone, Handbook
of Applied Cryptography, CRC Press, 1996.
R.Rivest, “The MD5 Message-Digest Algorithm”, Internet
RFC 1321, April 1992.
B. Preneel, and A. Bosselaers, “The Cryptographic Hash
Function RIPEMD-160”, CryptoBytes, vol 3, no 2,
Autumn 1997.
National Institute of Standards and Technology, SECURE
HASH STANDARD, FIPS PUB 180-1, 1995. February
13 2001
http://www.itl.nist.gov/fipspubs/fip180-1.htm.
R. M. Needham , “Denial Of Service,” Proceedings of the
1st ACM conference on Computer and
Communications Security
, pp 151-153, November 3-5,
1993, Fairfax, VA USA.
National Institute Of Standards and Technology, FIPS 112
– Password Usage. 1995. September 2001,
http://www.itl.nist.gov/fipspubs/fip112.htm.
D. Eastlake, S Crocker, and J Schiller, “Randomness
Recommendations for Security”, rfc1750,
http://www.i
OPTIMAL ANALYSIS OF A HYBRID AUTHENTICATION SYSTEM: WEB SECURITY VERSUS SYSTEM
PERFORMANCE
285