Shared authentication token secure against replay and weak key attacks

被引:36
|
作者
Yen, SM
Liao, KH
机构
关键词
authentication; cryptography; one-time password; reflection attack; replay attack; weak key attack;
D O I
10.1016/S0020-0190(97)00046-X
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, an authentication scheme that uses a never design of shared tamper resistant cryptographic token is originally proposed which can be very useful to enhance the security of most remote login systems. Conceptually, the proposed scheme is a weak key protected one-time password system. (C) 1997 Elsevier Science B.V.
引用
收藏
页码:77 / 80
页数:4
相关论文
共 50 条
  • [1] POSTER: iTieProbe: Is IoT Device Provisioning secure against MAC Layer authentication-token based replay attacks?
    Agrawal, Anand
    Maiti, Rajib Ranjan
    [J]. PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 1958 - 1960
  • [2] Secure Control Against Replay Attacks
    Mo, Yilin
    Sinopoli, Bruno
    [J]. 2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, : 911 - 918
  • [3] Secure Networked Control Systems Against Replay Attacks Without Injecting Authentication Noise
    Tang, Bixiang
    Alvergue, Luis D.
    Gu, Guoxiang
    [J]. 2015 AMERICAN CONTROL CONFERENCE (ACC), 2015, : 6028 - 6033
  • [4] FULL SECURE KEY EXCHANGE AND AUTHENTICATION WITH NO PREVIOUSLY SHARED SECRETS
    FERRER, JDI
    ROTGER, LHI
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 665 - 670
  • [5] Secure Authentication from a Weak Key, without Leaking Information
    Bouman, Niek J.
    Fehr, Serge
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 246 - 265
  • [6] Mobile Authentication Secure Against Man-In-The-Middle Attacks
    Bicakci, Kemal
    Unal, Devrim
    Ascioglu, Nadir
    Adalier, Oktay
    [J]. 9TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC'14) / THE 11TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC'14) / AFFILIATED WORKSHOPS, 2014, 34 : 323 - 329
  • [7] Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token
    Goldberg, Ian
    Jenkinson, Graeme
    Stajano, Frank
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 36 - 57
  • [8] Design of Authentication Protocols Preventing Replay Attacks
    Li, Junhong
    [J]. 2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, : 362 - 365
  • [9] Algebraic Replay Attacks on Authentication in RFID Protocols
    Chikouche, Noureddine
    Cherif, Foudil
    Benmohammed, Mohamed
    [J]. ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 153 - +
  • [10] Strategies against replay attacks
    Aura, T
    [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 59 - 68