Improved Session Based Password Security System
نویسندگان
چکیده
منابع مشابه
Per-Session Security: Password-Based Cryptography Revisited
Cryptographic security is usually defined as some form of guarantee that holds except when a bad event with negligible probability occurs, and nothing is guaranteed in that case. However, in settings where such failure can happen with substantial probability, one needs to provide guarantees even for the bad case. A typical example is where a (possibly weak) password is used instead of a secure ...
متن کاملHyperPass: Hypervisor Based Password Security
Passwords are the linchpin in the security of an increasing number of online services – services that range from social networking to business communication to banking. Given their importance, it is unfortunate that passwords are relatively easily stolen using a number of different types of attack. We introduce HyperPass: an approach and proof-of-concept system that aims to prevent some of thes...
متن کاملSecurity Analysis and Improvements of a Password-Based Mutual Authentication Scheme with Session Key Agreement
Password-based authentication schemes have been widely adopted to protect resources from unauthorized access. In 2008, Chang-Lee proposed a friendly password-based mutual authentication scheme to avoid the security weaknesses of Wu-Chieu’s scheme. In this paper, we demonstrate that Chang-Lee’s scheme is vulnerable to user impersonation attack, server masquerading attack, password guessing attac...
متن کاملImproving system security via proactive password checking
As the Internet has grown, its user community has changed from a small tight knit group of researchers to a loose gathering of people on a global network. The amazing and constantly growing numbers of machines and users ensures that untrustworthy individuals have full access to that network. High speed inter-machine communication and even higher speed computational processors have made the thre...
متن کاملOn the Security of an Improved Password Authentication Scheme Based on ECC
The design of secure remote user authentication schemes for mobile applications is still an open and quite challenging problem, though many schemes have been published lately. Recently, Islam and Biswas pointed out that Lin and Hwang et al.’s password-based authentication scheme is vulnerable to various attacks, and then presented an improved scheme based on elliptic curve cryptography (ECC) to...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advances in Computer Science and Technology
سال: 2020
ISSN: 2320-2602
DOI: 10.30534/ijacst/2020/01942020