Secure Chess-Based Data Exchange and User Validation

Secure Chess-Based Data Exchange and User Validation

Dushyant Singh, Baldev Singh
Copyright: © 2022 |Pages: 10
DOI: 10.4018/JCIT.296718
Article PDF Download
Open access articles are freely available for download


In each and every organization, data communication is the essential part. On the daily basis, the data is exchanged within the organization as well as outside the organization. The passwords and OTPs play a critical role in securing the data. Now, how long and how well these OTP will work on, will depend on the strength of these passwords and OTPs. In the proposed work, we have used the novel concept of applying the chess game in the process of the OTP or password generation. Here, we have made use of the four-player chess, with the dynamic movement of the Kings, Bishops and other components. The formation of the OTP for the user authentication as well as data sending is done on the basis of the movement of the moveable objects of the chess. For testing the strength of the pattern, we have tested it using the various entropy checking tools and the results are quite satisfactory comparing to the results of the other.
Article Preview


With the growth of the Internet, various students, colleges, universities, offices, government organization are now online or linking themselves over internet. The main advantage of the internet is that, all information is available, just a matter to search the information we desire. Like a proverb, “Great Power, comes Great Responsibilities “, with the great benefit that the information or all data is available at one place or over internet, there are chances that the data can be misused. Just like the authentic users are growing day by day, unauthentic users like hackers are also growing day-day, causing the threat to the information which is available over the internet. (M. Abdalla, 2014).

First and the foremost thing is to authenticate the user before accessing any data. Users’ authentication is a mean of recognizing the customer and confirming that the customer is allowed to get to some restricted administrations. Customer authentication means working up a connection between the customer and some character. A character is the peculiarity property of a customer which ideally can't be fabricated or copied. Before long, personalities are completed by things which customers know (passwords), have (puzzle keys or security tokens) or properties which they have (biometrics). (M. Abdalla, 2014).

In the case of networks, when the user when require to send the data, such data communication requires some costs in terms availing the proper secure channel or environment.

This infers the organization workplaces will make the recognized data accessible just to explicit people, generally the people who pay for getting the administration. For this situation, a network should in all likelihood perceive real customers from the strange ones. In authentication, a customer sends his ID (e.g., name, IP address) and verification of his character to a sensor with the objective that the sensor can pick whether the personality is genuine and in fact has a spot with the customer of that name. Upon productive authentication, the sensor approves the customer who is enabled access to the data. (J. Becerra V. et al, 2017).

Figure 1.

Data security measures


In order to maintain the proper data security in the organization it is required to perform some basic operations as shown in fig 1. The formal training of employees required for training the employees about the necessity of data security. Performing measures for maintaining onsite as well as online data security, like authentication process, encrypting data and soon. (M. Abdalla et al 2014).

Some measures of data security are as follows:

  • Authentication: The target of this organization is to allow trustable correspondences between 2 extraordinary hubs. Precisely once a hub gets parcels from a supply, it should check that concerning character of the supply hub. A technique to agitate provides this organization is victimization accreditations, whoever while not central management unit, key conveyance and key the officers square measure contestable. (M. Abdalla et al 2014).

  • Information secretly: Per this organization, every hub or application should approach incontestable organizations that it's the consent to induce to. out and away most of organizations that measure given by info on the coding procedures anyway in networks there's no central organization, key circulation went up against numerous troubles and from time to time immeasurable. (F. Benhamouda O et al 2015)

Complete Article List

Search this Journal:
Volume 26: 1 Issue (2024)
Volume 25: 1 Issue (2023)
Volume 24: 5 Issues (2022)
Volume 23: 4 Issues (2021)
Volume 22: 4 Issues (2020)
Volume 21: 4 Issues (2019)
Volume 20: 4 Issues (2018)
Volume 19: 4 Issues (2017)
Volume 18: 4 Issues (2016)
Volume 17: 4 Issues (2015)
Volume 16: 4 Issues (2014)
Volume 15: 4 Issues (2013)
Volume 14: 4 Issues (2012)
Volume 13: 4 Issues (2011)
Volume 12: 4 Issues (2010)
Volume 11: 4 Issues (2009)
Volume 10: 4 Issues (2008)
Volume 9: 4 Issues (2007)
Volume 8: 4 Issues (2006)
Volume 7: 4 Issues (2005)
Volume 6: 1 Issue (2004)
Volume 5: 1 Issue (2003)
Volume 4: 1 Issue (2002)
Volume 3: 1 Issue (2001)
Volume 2: 1 Issue (2000)
Volume 1: 1 Issue (1999)
View Complete Journal Contents Listing