Remote scheme for password authentication based on theory of quadratic residues
نویسندگان
چکیده
We propose a remote password authentication scheme based on quadratic residues. In our scheme, any legal user can freely choose his own password in the card initialization phase. Using his password and smart card which contains identity and other information, he can then log into the system successfully. According to our analysis, intruders cannot obtain any secret information from the public information, or derive any password from intercepted messages. In addition, our scheme can withstand the attack of replaying previously intercepted log-in requests.
منابع مشابه
Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1
Lizhen Yang, Xiaoyun Wang, Dong Zheng, Kefei Chen Abstract: In 1988, Harn, Laih and Huang proposed a password authentication scheme based on quadratic residues. However, in 1995, Chang, Wu and Laih pointed out that if the parameters δ β α , , and λ are known by the intruder, this scheme can be broken. In this paper, we presented another attack on the Harn-Laih-Huang scheme. In our attack, it do...
متن کاملFast Remote User Authentication Scheme with Smart Card Based on Quadratic Residue
AbstrAct: There are many kinds of online services in our daily life, such as e-mail and messenger. When we link to a remote host, we are required to login first, supplying a username and the corresponding password, and then obtain the resources or have services. Most commonly, we might use a smart card to assistant us to login a remote site. In 1981, Lamport proposed a remote authentication sch...
متن کاملA Novel Remote User Authentication Scheme Using Smart Card with Biometric Based on Ecdlp
In this paper, a novel efficient remote user authentication scheme using smart card with biometric based on Elliptic Curve Discrete Logarithm Problem (ECDLP) has been proposed. A remote user authentication scheme is a client server based protocol whereby an authentication server identifies the identity of a remote user when he/she individually logging on to the server using public, untrusted, u...
متن کاملA remote password authentication scheme for multiserver architecture using neural networks
Conventional remote password authentication schemes allow a serviceable server to authenticate the legitimacy of a remote login user. However, these schemes are not used for multiserver architecture environments. We present a remote password authentication scheme for multiserver environments. The password authentication system is a pattern classification system based on an artificial neural net...
متن کاملImproving the Password-Based Authentication against Smart Card Security Breach
Password-based authentications using smart cards are very necessary between login users and a remote server. Smart card security breach threatens the security of password-based authentication schemes with smart cards. A password-based authentication scheme with smart cards against smart card security breach was proposed by C.T. Li et al. recently. However, it is noted that Li et al.'s scheme ne...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Communications
دوره 18 شماره
صفحات -
تاریخ انتشار 1995