A password authentication scheme over insecure networks
نویسندگان
چکیده
Authentication ensures that system’s resources are not obtained fraudulently by illegal users. Password authentication is one of the simplest and the most convenient authentication mechanisms over insecure networks. The problem of password authentication in an insecure networks is present in many application areas. Since computing resources have grown tremendously, password authentication is more frequently required in areas such as computer networks, wireless networks, remote login, operation systems, and database management systems. Many schemes based on cryptography have been proposed to solve the problem. However, previous schemes are vulnerable to various attacks and are neither efficient, nor user friendly. Users cannot choose and change their passwords at will. In this paper, we propose a new password authentication scheme to achieve the all proposed requirements. Furthermore, our scheme can support the Diffie–Hellman key agreement protocol over insecure networks. Users and the system can use the agreed session key to encrypt/decrypt their communicated messages using the symmetric cryptosystem. © 2005 Elsevier Inc. All rights reserved. ✩ This research was partially supported by the National Science Council, Taiwan, ROC, under contract no. NSC92-2213-E-324-023. * Corresponding author. E-mail address: [email protected] (M.-S. Hwang). 0022-0000/$ – see front matter © 2005 Elsevier Inc. All rights reserved. doi:10.1016/j.jcss.2005.10.001 728 I-E. Liao et al. / Journal of Computer and System Sciences 72 (2006) 727–740
منابع مشابه
An Improved Protocol for Password Authentication Using Smart Cards
In recent years, several password authentication schemes for remote login and verification have been widely implemented for systems that control and access to Internet applications. Therefore, how to assure the security protection of these related operations in computer networks has been extensively investigated by many engineers in these two decades. Recently, an advanced smart card based pass...
متن کاملAn Improved Efficient Remote Password Authentication Scheme with Smart Card over Insecure Networks
In 2006, Liao et al. proposed a scheme over insecure networks. In 2006, Yoon-Yoo, and in 2008, Xiang et al. analyzed Liao et al.’s scheme and both of them pointed out, more or less, same vulnerabilities: like offline password guessing attack, impersonating the server by replay attack, denial of service attack on password changing and insider attack on it. But none of them suggested any solution...
متن کاملWeaknesses and Improvements of a One-time Password Authentication Scheme
Authentication of communicating entities and confidentiality of transmitted data are fundamental procedures to establish secure communications over public insecure networks. Recently, many researchers proposed a variety of authentication schemes to confirm legitimate users. Among the authentication schemes, a one-time password authentication scheme requires less computation and considers the li...
متن کاملA Novel Remote User Authentication Scheme Using Smart Card with Biometric Based on Ecdlp
In this paper, a novel efficient remote user authentication scheme using smart card with biometric based on Elliptic Curve Discrete Logarithm Problem (ECDLP) has been proposed. A remote user authentication scheme is a client server based protocol whereby an authentication server identifies the identity of a remote user when he/she individually logging on to the server using public, untrusted, u...
متن کاملCryptanalysis of A Dynamic Password Based User Authentication Scheme for HWSNs
Recently, Das, Sharma, Chatterjee and Sing proposed a dynamic password-based user authentication scheme for hierarchical wireless sensor networks (HWSNs). Authors claimed that their authentication scheme can achieve better security and efficiency as compared to those for other related password-based authentication methods. However, in this paper, we found their scheme is insecure and any dishon...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Comput. Syst. Sci.
دوره 72 شماره
صفحات -
تاریخ انتشار 2006