IMPROVING COMPUTER AUTHENTICATION SYSTEMS WITH BIOMETRIC TECHNOLOGIES

In this paper we describe that user authentication methods based on hash functions like MD5, NT / NTLM and SHA-1 can be easily compromised. We used methods that utilize cryptanalytic tables based on time memory tradeoff procedures (TMTO) and we analyzed certain limitations on this approach. We suggest improvements to this technique and additional concepts like parallelized creation and querying of tables which improve speed and memory efficiency of the entire procedure. With those modifications a new concept for TMTO procedures is created. We also describe vulnerabilities based on physical access to a segment of a computer network infrastructure that can compromise almost any quasi secure system. Regarding those vulnerabilities we present a number of biometric authentication methods that can minimize or nullify this security risks.