Improving Service Credibility in Password Authentication Peer Service
نویسنده
چکیده
Two server password-based authentication protocols (Two-Server PAKE), where two servers co-operate to authenticate a client on the basis of Password only and if one server is compromised due to Insider Attack or Distributed Denial Of Service Attack (DDOS). In Asymmetric two-server PAKE protocol runs in series and only the front-end server and the client need to establish a secret session key. In Two-Server PAKE protocol has been symmetric is not efficient for practical use. So, a Symmetric Two-Server PAKE protocol which supports two servers to compute in parallel to authenticate a client by Encrypted key exchange(EKE) and meanwhile keeps efficiency for practical use. It requires only four communication rounds for the client and two servers mutually to authenticate and simultaneously to establish secret session keys. Keywords— PAKE; Symmetric; Asymmetric; EKE
منابع مشابه
Improving Usability of Password Management with Standardized Password Policies
Recent studies indicate that many users have difficulties managing online passwords for the increasing number of accumulated accounts. As a result, users often adopt strategies to simplify password management, such as selecting weak passwords and reusing passwords across multiple accounts, which unfortunately can cause security vulnerabilities. This problem is exacerbated by the fact that users...
متن کاملImproving the Security of SSO in Distributed Computer Network using Digital Certificate and one Time Password (OTP)
A Single Sign–on is a new authentication mechanism for user to use multiple services provided by service provider in distributed computer network. It is a one type of application in that allows users to log in once and access to multiple independent applications without being asked to log in again at every application. It enables a legal user with a single credential to be authenticated by mult...
متن کاملA Simple Attack on a Recently Introduced Hash-based Strong-password Authentication Scheme
The user authentication is an important part of network security. Several strong-password authentication protocols have been introduced, but a secure scheme, which probably withstands to several known attacks, is not yet available. Recently, a hash-based strong-password authentication scheme was described in [2], which withstands to the several attacks, including replay, passwordfile compromise...
متن کاملCryptanalysis of a User Authentication Protocol
Recently, Peyravin and Jeffries proposed a password-based practical authentication scheme using oneway collision-resistant hash functions. However, Shim and Munilla independently showed that the scheme is vulnerable to off-line guessing attacks. Hölbl, Welzer and Brumenn presented an improved password-based protocols. In the paper, we showed that the improved scheme still suffers from off-line ...
متن کاملA nonce-based mutual authentication system with smart card
User authentication is an important security mechanism for recognizing legal remote users. We propose an available and secure authentication scheme for service provider to verify users without using verification table. It can resist most of the attacks by improving nonce-based mutual authentication mechanism, and ensure the security by dynamic session key. User may change his password freely. O...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014