Reference Hub2
Secure Chess-Based Data Exchange and User Validation

Secure Chess-Based Data Exchange and User Validation

Dushyant Singh, Baldev Singh
Copyright: © 2022 |Volume: 24 |Issue: 4 |Pages: 10
ISSN: 1548-7717|EISSN: 1548-7725|EISBN13: 9781799878230|DOI: 10.4018/JCIT.296718
Cite Article Cite Article

MLA

Singh, Dushyant, and Baldev Singh. "Secure Chess-Based Data Exchange and User Validation." JCIT vol.24, no.4 2022: pp.1-10. http://doi.org/10.4018/JCIT.296718

APA

Singh, D. & Singh, B. (2022). Secure Chess-Based Data Exchange and User Validation. Journal of Cases on Information Technology (JCIT), 24(4), 1-10. http://doi.org/10.4018/JCIT.296718

Chicago

Singh, Dushyant, and Baldev Singh. "Secure Chess-Based Data Exchange and User Validation," Journal of Cases on Information Technology (JCIT) 24, no.4: 1-10. http://doi.org/10.4018/JCIT.296718

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In each and every organization, data communication is the essential part. On the daily basis, the data is exchanged within the organization as well as outside the organization. The passwords and OTPs play a critical role in securing the data. Now, how long and how well these OTP will work on, will depend on the strength of these passwords and OTPs. In the proposed work, we have used the novel concept of applying the chess game in the process of the OTP or password generation. Here, we have made use of the four-player chess, with the dynamic movement of the Kings, Bishops and other components. The formation of the OTP for the user authentication as well as data sending is done on the basis of the movement of the moveable objects of the chess. For testing the strength of the pattern, we have tested it using the various entropy checking tools and the results are quite satisfactory comparing to the results of the other.