fullrecord |
[{"key": "dc.contributor.advisor", "value": "Marttiin, Pentti", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Syv\u00e4nt\u00f6, Adi", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2023-01-17T07:48:32Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2023-01-17T07:48:32Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2023", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/85047", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Nollatietotodistusten hy\u00f6dynt\u00e4minen k\u00e4ytt\u00e4j\u00e4tietojen todentamisessa on kehittyv\u00e4n digitalisaation, ja tietoturvauhkien vuoksi saanut kasvavassa m\u00e4\u00e4rin huomiota potentiaalisena ratkaisuna perinteisen salasanaan perustuvan todentamismenetelm\u00e4n riskeihin ja haavoittuvuuksiin. Perinteinen salasanaan perustuva todentamismenetelm\u00e4 on altis vahinkoa aiheuttaville hy\u00f6kk\u00e4yksille muiden tietoturvahaasteiden lis\u00e4ksi. Nollatietotodistukset sen sijaan mahdollistavat identiteetin todistamisen ilman tarvetta sensitiivisen informaation s\u00e4ilytt\u00e4miseen ja l\u00e4hett\u00e4miseen verkon v\u00e4lityksell\u00e4. Kirjallisuuskatsauksen tavoitteena oli selvitt\u00e4\u00e4, kuinka nollatietotodistuksia hy\u00f6dynnet\u00e4\u00e4n verkkoymp\u00e4rist\u00f6ss\u00e4 tapahtuvassa k\u00e4ytt\u00e4j\u00e4tietojen todentamisessa, sek\u00e4 kahden implementaatioesimerkin avulla tunnistaa nollatietotodistusten tarjoamia hy\u00f6tyj\u00e4 ja potentiaalisia haittoja. SRP-protokollassa nollatietoisuus saavutetaan k\u00e4ytt\u00e4j\u00e4n salasanasta generoidun \u2013 palvelimen kanssa jaetun arvon avulla, joka ei itsess\u00e4\u00e4n vaaranna k\u00e4ytt\u00e4j\u00e4n sensitiivist\u00e4 informaatiota. M-Pin on puolestaan useaan tekij\u00e4\u00e4n pohjautuva todentamismenetelm\u00e4, jossa hy\u00f6dynnet\u00e4\u00e4n niin sanotun luotetun osapuolen olemassaoloa. Luotettu osapuoli vastaa k\u00e4ytt\u00e4j\u00e4n identiteettisidonnaisen salaisuuden my\u00f6nt\u00e4misest\u00e4, josta k\u00e4ytt\u00e4j\u00e4n valitseman PIN-koodin lis\u00e4ksi generoidaan varmiste, jota k\u00e4ytet\u00e4\u00e4n k\u00e4ytt\u00e4j\u00e4n todentamiseen palvelimelle. Nollatietotodistuksia hy\u00f6dynt\u00e4v\u00e4t k\u00e4ytt\u00e4j\u00e4n todentamisen menetelm\u00e4t osoittautuivat hyvin vastustuskykyisiksi haavoittuvuuksia, kuten v\u00e4liintulo- ja sanakirjahy\u00f6kk\u00e4yksi\u00e4 vastaan. Menetelm\u00e4t koostuvat kuitenkin turvallisuuden takaamiseksi haastavista laskennallisista toimenpiteist\u00e4 ja menetelmist\u00e4, joilla voi olla negatiivinen vaikutus implementaatiomahdollisuuksiin ja skaalautuvuuteen.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The use of zero-knowledge proofs to authenticate user has received increasing attention due to evolving digitalization and security threats as a potential solution to the risks and vulnerabilities of the traditional password-based authentication method. The traditional password-based authentication method is vulnerable to damaging attacks in addition to other security challenges. In contrast, zero-knowledge proofs allow proving identity without the need to store and transmit sensitive information over internet. The aim of this literature review was to investigate how zero-knowledge proofs are used in authenticating user credentials in an online environment, and to identify the benefits and potential drawbacks of zero-knowledge proofs through two implementation examples. In the SRP protocol, zero-knowledge is achieved through a shared value between user and server, generated from the user's password, which itself does not compromise the user's sensitive information. M-Pin, on the other hand, is a multi-factor authentication method that includes the existence of a so-called Trusted Party. The Trusted Party is responsible for granting a user an identity-related secret, which, in addition to the PIN chosen by the user, is used to generate a token required when authenticating user to the server. User authentication methods using zero-knowledge proofs proved to be highly resistant to vulnerabilities such as man-in-the-middle and dictionary attacks. However, they consist of challenging computational operations and methods to ensure security, thus can have a negative impact on implementation capabilities in addition to scalability.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2023-01-17T07:48:32Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2023-01-17T07:48:32Z (GMT). No. of bitstreams: 0\n Previous issue date: 2023", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "28", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "nollatietotodistus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "todentaminen", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "todistusmenetelm\u00e4", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Secure Remote Password", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "M-Pin", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Nollatietotodistukset k\u00e4ytt\u00e4j\u00e4tietojen todentamisessa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202301171350", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "protokollat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|