Authentication Protocols Using Hoover-Kausik's Software Token
نویسندگان
چکیده
In 1999, Hoover and Kausik introduced a software token using the cryptographic camouflage technique and claimed that it can resist various on-line and off-line guessing attacks. Later, Kwon presented an authentication protocol based on the cryptographic camouflage technique and DSA, and pointed out that this initial protocol is vulnerable to an impersonation attack once a server’s secret key or private key is compromised. Then, Kwon proposed a modified version that can resist such an impersonation attack by cryptographically embedding the recipient’s identity in the user’s signature to ensure that only the intended recipient will accept this signature. However, we find that Kwon’s modified protocol still has some drawbacks. In this paper, we first demonstrate the drawbacks of Kwon’s modified protocol and then propose an improved authentication protocol based on the cryptographic camouflage technique and RSA. Finally, we show that our improved protocol can provide prefect forward secrecy and can resist the off-line guessing attack, the impersonation attack, the replay attack, and the DenningSacco attack. Furthermore, the resistance of our improved protocol to the modification attack is also enhanced by additionally using credit-card sized CD-ROMs.
منابع مشابه
Modified USB Security Token for User Authentication
Computer security has been a significant importance in today’s world. Many researches have been done in order to improve the security services with encryption and decryption of sensitive. In addition, Security protocols have been developed to protect accessing the data from the authorized users. One of these protocols is the One-Time Password (OTP) authentication in the USB security tokens. A w...
متن کاملFragToken: Secure Web Authentication using the Fragment Identifier
While web applications are increasingly used to manage important private data, the application programming environment provided by browsers is heavily constrained. In order to implement new features, including novel authentication schemes, many resort to browser plugins. Unfortunately, browser plugins present two deployment disadvantages: they require significant user involvement at installatio...
متن کاملFormal Analysis of V2X Revocation Protocols
Research on vehicular networking (V2X) security has produced a range of security mechanisms and protocols tailored for this domain, addressing both security and privacy. Typically, the security analysis of these proposals has largely been informal. However, formal analysis can be used to expose flaws and ultimately provide a higher level of assurance in the protocols. This paper focusses on the...
متن کاملDestructible Password Functionality Authentication Protocol
One of the biggest challenges that face the use of password as a security token is its low entropy. Researchers have proposed a cryptographic approach in an attempt to strengthen the security of password systems. In this paper, we investigate a new approach using irreducible polynomial in prime field GF (2) to build a secure password system that transforms the text of the password with every tr...
متن کاملA secure and performant token-based authentication for infrastructure and mesh 802.1X networks
This work deals with the design of secure handoff protocols for wireless networks using the security model introduced by IEEE 802.1X standard. The key exchange model introduced in the standard might be implemented in multiple ways each one carrying advantages and disadvantages in terms of security and performance when applied to reauthentication protocol. After the analysis of different model o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Inf. Sci. Eng.
دوره 22 شماره
صفحات -
تاریخ انتشار 2006