Published 2025-04-30
Keywords
- Security Analysis,
- Communication Overhead,
- Unauthorized Access,
- Security Attacks,
- Authentication Protocol
How to Cite
Copyright (c) 2025 International Journal of Advanced Research and Interdisciplinary Scientific Endeavours

This work is licensed under a Creative Commons Attribution 4.0 International License.
Abstract
In order to resist unauthorized access, consumer storage devices are typically protected using a low entropy password. However, storage devices are not fully protected against an adversary because the adversary can utilize an off-line dictionary attack to find the correct password and/or run an existing algorithm for resetting the existing password. It can be used as a replacement for the username and password as a convenient log-in, or as a simple alternative to password re- sets. It can also be deployed for enhancing the boarding and KYC (Know Your Customer) methods. It has a tremendous advantage in improving a brand’s user experience. In today’s hi-tech world, solving the password problem has been the goal for many financial service providers and various online enterprises. Unfortunately, their customers either use weak passwords or the same passwords time and again. Furthermore, many of us should be changing the passwords regularly to avoid them being stolen or hacked by fraudsters. Biometric identification of the human iris., As demands on secure identification are constantly rising and as the human iris provides with a pattern that is excellent for identification, the use of inexpensive equipment could help iris recognition become a new standard in security systems. In addition, a password protected device may also be stolen or misplaced, allowing an adversary to easily retrieve all the stored confidential information from a removable storage device. In order to protect the consumer’s confidential information that has been stored, this paper proposes a mutual authentication and key negotiation protocol that can be used to protect the confidential information in the device. The functionality of the protocol enables the storage device to be secure against relevant security attacks. A formal security analysis using Burrows-Abadi-Needham (BAN) logic is presented to verify the presented algorithm. In addition, a performance analysis of the proposed protocol reveals significantly reduced communication overhead compared to the relevant literature.