skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Two-factor authentication using OpenSSH.

Abstract

No abstract prepared.

Authors:
Publication Date:
Research Org.:
Sandia National Laboratories
Sponsoring Org.:
USDOE
OSTI Identifier:
901413
Report Number(s):
SAND2006-0410J
TRN: US200714%%13
DOE Contract Number:
AC04-94AL85000
Resource Type:
Journal Article
Resource Relation:
Journal Name: Proposed for publication in the Linux Journal.
Country of Publication:
United States
Language:
English
Subject:
99 GENERAL AND MISCELLANEOUS//MATHEMATICS, COMPUTING, AND INFORMATION SCIENCE; O CODES; VALIDATION; COMPUTER NETWORKS; ENTRY CONTROL SYSTEMS

Citation Formats

Sery, Paul G. Two-factor authentication using OpenSSH.. United States: N. p., 2006. Web.
Sery, Paul G. Two-factor authentication using OpenSSH.. United States.
Sery, Paul G. Sun . "Two-factor authentication using OpenSSH.". United States. doi:.
@article{osti_901413,
title = {Two-factor authentication using OpenSSH.},
author = {Sery, Paul G.},
abstractNote = {No abstract prepared.},
doi = {},
journal = {Proposed for publication in the Linux Journal.},
number = ,
volume = ,
place = {United States},
year = {Sun Jan 01 00:00:00 EST 2006},
month = {Sun Jan 01 00:00:00 EST 2006}
}
  • The Internet has evolved into a very hostile ecosystem where"phishing'' attacks are common practice. This paper shows that thethree-party group Diffie-Hellman key exchange can help protect againstthese attacks. We have developed a suite of password-based cipher suitesfor the Transport Layer Security (TLS) protocol that are not onlyprovably secure but also assumed to be free from patent and licensingrestrictions based on an analysis of relevant patents in thearea.
  • When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in amore » group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.« less
  • Available data on cancer incidence for 1969-1971 showed statistically elevated rates for breast cancer in St. Louis Park, Minnesota, a community with creosote contamination of the water supply, when compared with the rest of the Minneapolis-St. Paul area taken as the reference population. In order to assess the effect of other known risk factors for breast cancer, 75 persons with breast cancer in each of the two populations were interviewed to obtain frequencies of known risk factors. An adjusted morbidity ratio in the two populations and an expected case rate in the exposed community were calculated from these frequencies, usingmore » relative risk values from the medical literature. The adjusted morbidity ratio was less than 1.0, and the observed rate was almost identical to the new expectation, although the age-adjusted rates alone had suggested a significant difference in incidence. This method makes use of relative risks from published studies rather than those associated with local cases and controls. It allows more refined evaluation of differences in cancer rates between communities than can be provided by age- and sex-specific calculations alone, and may allow use of available statistics in situations where cost, temporal considerations, or population size do not favor large new studies.« less
  • The authors have analyzed the human growth hormone-releasing factor (GHRF) gene by high-resolution restriction mapping of its PCR amplification products. Two intragenic PCR fragment length polymorphisms (PCRFLPs) were detected in introns A and C of the GHRF gene, whose heterozygosities are 40 and 7%, respectively. Linkage analysis using the CEPH panel showed that GHRF is linked to several markers on chromosome 20 and assigned the GHRF locus to a region near the centromere between D2OS27 (assigned to 20p12.1-p11.23) and D20S16 (assigned to 20q12). These intragenic PCRFLPs and the tightly linked polymorphisms should provide useful markers for linkage studies of GHRFmore » alleles in familial disorders of growth such as isolated growth hormone deficiency. 12 refs., 2 figs.« less