Work place: Department of Computer Science, Ahmadu Bello University, Zaria – Nigeria
E-mail: aaobiniyi@gmail.com
Website:
Research Interests: Computer systems and computational processes, Information Security, Network Security, Database Management System, Data Structures and Algorithms, Information-Theoretic Security
Biography
Prof. A.A. Obiniyi received his Ph.D degree in Computer Science from Ahmadu Bello University (ABU), Zaria in Kaduna State of Nigeria in 2009. He is a Professor of Computer Science and a member of Nigeria Computer Society (NCS), Internet Society (ISOC), Academia in Information Technology Professionals (AITP), Institute of Electrical and Electronic Engineers (IEEE) and a Chartered member of Computer Professionals (Registration Council of Nigeria)[CPN]. He lectures in the Department of Computer Science of Ahmadu Bello University, Zaria – Kaduna State. Presently, he is co-supervising eight Ph. D. and thirteen Master of Computer Science students with many Ph.D. and Master of Computer Science scholars completed their studies. He also has many publications to his credit. His research interests include Computer Networking, Cyber Security and Database Development among others.
By Bello A. Buhari Afolayan Ayodele Obiniyi Sahalu B. Jubaidu Armand F. Donfack Kana
DOI: https://doi.org/10.5815/ijwmt.2023.04.03, Pub. Date: 8 Aug. 2023
Quantum cryptography is the most convenient resolution for information security systems that presents an ultimate approach for key distribution. Today, the most viable key distribution resolutions for information security systems are those based on quantum cryptography. It is based on the quantum rules of physics rather than the assumed computational complexity of mathematical problems. But, the initial BB84 quantum key distribution protocol which is the raw key exchange of S13 quantum key distribution protocol has weakness of disclosure of large portion of secrete key or eavesdropping. Also, it cannot make use of most of the generated random bit. This paper enhanced S13 quantum key distribution protocol by employing polarization, secrete key disclosure and non-repudiation. The use of biometric or MAC address ensures non-repudiation. The row key exchange part of the S13 quantum key distribution which is the same as BB84 is enhanced by employing polarization techniques to make use of most of the generated random bit. Then, the tentative final key generated at the end of error estimation phase should be divided into blocks, padding, inverting the last bit of each block and XORing the block to generate a totally different key from the tentative one. Also, the random bits will be from biometric or serve MAC address respectively. The enhanced S13 quantum key is evaluated using cryptanalysis which shows that the enhanced protocol ensures disclosures of large portion of secrete key to prevent eavesdropping, utilization of most of the chosen binary strings to generate strong key and safeguarding against impersonation attack.
[...] Read more.By Bello Alhaji Buhari Afolayan Ayodele Obiniyi
DOI: https://doi.org/10.5815/ijieeb.2022.05.05, Pub. Date: 8 Oct. 2022
It is a common requirement for modern web applications as many if not all services that need personalization and control of access move online. Due to increase in these services becoming online, login authentications become targets to attackers. Therefore, there is need for secure and efficient web application login authentication schemes to ensure users access control, security and privacy. Present schemes have limitations such as users spent a lot of time browsing to create image portfolios than to create passwords and PINs, subject to active impersonation attack, some will only suit well for financial transaction system due to the TIC involved, some may have hash collisions, some require addition BLE device to be install and available on the authentication systems and cannot be used for higher data rates and long distance unlike cellular and WiFi devices, some involves reuse of password at single or multiple service providers which may lead to a password reuse attack called domino effect and some work well in application that needs to share permission with other applications like social media applications inform of APIs and improvising of user anonymity. We propose an improved web application login authentication scheme using hybrid cryptography with user anonymity. The improved scheme used blowfish – the most efficient private key algorithm, Elgamal – very secure public key algorithm and SHA-2 hash function combined together to enable high performance and security. The methods are thoroughly discussed and its security evaluated to show that it provides password protection, user privacy, perfect forward secrecy, mutual authentication and security against impersonation attack.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals