Multilevel Verification and User Recognition Strategy for E-mail Clients

  • Artan LumaEmail author
  • Bujar Raufi
  • Burim Ismaili
Conference paper


User authentication and identification have always represented a challenge in web-based e-mail systems. The text-based authentication and user identification are not sufficient to address the security issues facing web-based e-mail systems. This sort of security is completely retrograde and obsolete for current security threats that easily undermine authentication, identification and non-repudiation. In this paper, a security increase in e-mail client is proposed by introducing multiple-level authentication and identification in e-mail clients. The proposed multilevel authentication and identification consist of four levels, where level-1 is the text-based authentication, level-2 involves an image based authentication and finally level-3 and level-4 use a specific algorithm that exploits the powerful properties of two mathematical operators called Pentors and UltraPentors applied against the image in level-2.


Algorithms Authorisation Cryptography Cryptosystems E-mail security User authentication 


  1. 1.
    S.L. Garfinkel, E-mail based authentication and identification: an alternative to PKI. IEEE Comput. Soc. 1(6), 20–26 (2003)Google Scholar
  2. 2.
    M. Dietz, A. Czeskis, D.S. Wallach, D. Balfanz, Origin-bound certificates: a fresh approach to strong client authentication for the web, in Proceedings of the 21st Usenix Security Symposium, 2012Google Scholar
  3. 3.
    M. Hern, An update on our war against account hijackers. The Google Blog (2013). Available via GOOGLE Online Security. of subordinate document. Cited 15 June 2013
  4. 4.
    S. Balaji, Authentication techniques for engendering session passwords with colors and text. Adv. Inf. Technol. Manage. 1(2), 71–78 (2012)MathSciNetGoogle Scholar
  5. 5.
    H. Zhao, X. Li, S3PAS: a scalable shoulder-surfing resistant textual-graphical password authentication scheme, in 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW 07) (2007), pp. 467–472Google Scholar
  6. 6.
    S. Anand, P. Jain, Nitin, R. Rastogi, Security analysis and implementation of 3-level security system using image based authentication, in Computer Modelling and Simulation (UKSim) (2012), pp. 547–552Google Scholar
  7. 7.
    H.A. Dinesha, V.K. Agrawal, Multi-level authentication technique for accessing cloud services, in International Conference on Computing, Communication and Applications (ICCCA) (2012), pp. 1–4Google Scholar
  8. 8.
    R. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)CrossRefzbMATHMathSciNetGoogle Scholar
  9. 9.
    D. Boneh, Twenty years of attacks on the RSA cryptosystem. Not. Am. Math. Soc. 46(2), 203–213 (1999)zbMATHMathSciNetGoogle Scholar
  10. 10.
    D.J. Wheeler, R.M. Needham, TEA, a tiny encryption algorithm. Lecture Notes in Computer Science (LNCS) (Leuven, Belgium: Fast Software Encryption: Second International Workshop), vol. 1008 (1994), pp. 363–366Google Scholar
  11. 11.
    J. Kelsey, B. Schneier, D. Wagner, Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X NewDES, RC2, and TEA. Lecture Notes in Computer Science (LNCS) vol. 1334 (1997), pp. 233–246Google Scholar
  12. 12.
    A. Bogdanov, M. Wang, Zero-correlation linear cryptanalysis with reduced data complexity. Lecture Notes in Computer Science (LNCS) (Fast Software Encryption 2012), vol. 7549 (2012), pp. 29–48Google Scholar
  13. 13.
    A. Luma, B. Ismaili, B. Raufi, Multilevel user authentication and identification scheme for e-mail clients. in Proceedings of the world congress on engineering, WCE 2013, 3–5 July 2013. Lecture notes in engineering and computer science, London, UK (2013), pp. 1221–1225Google Scholar
  14. 14.
    A. Luma, B. Raufi, New data encryption algorithm and its implementation for online user authentication, in International Conference on Security and Management, (CSREA Press, USA, 2009), pp. 81–85Google Scholar
  15. 15.
    A. Luma, B. Raufi, Xh Zenuni, Asymmetric encryption decryption with Pentor and ultra Pentor operators. Online J. Sci. Technol. (TOJSAT) 2(2), 9–12 (2012)Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2014

Authors and Affiliations

  1. 1.South East European UniversityTetovoMacedonia

Personalised recommendations