DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password Security

被引:0
|
作者
Wang, Hua [1 ]
Guo, Yao [1 ]
Chen, Xiangqun [1 ]
机构
[1] Peking Univ, Sch EECS, Inst Software, Key Lab High Confidence Software Technol,Minist E, Beijing, Peoples R China
关键词
D O I
10.1109/HASE.2008.22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditionally, password authentication is distributed to each application, so developers have to take countermeasures by themselves to defend passwords against various threats. This requires a great amount of effort, a lot of which is repetitive. The high cost poses a potential hindrance to the adoption of countermeasures. This paper proposes a new reuse-oriented password authentication framework, called Desktop Password Authentication Center (DPAC), to reuse counter-measures among applications, thus reducing the cost of defending passwords against threats. In DPAC, we move the task of authentication, as well as the responsibility for protecting passwords, from applications to a dedicated Authentication Center (AuthCenter), so that countermeasures only need to be taken in AuthCenter and afterwards are reused by all applications. This solution can eliminate a lot of repetitive work and reduce the cost significantly. We demonstrate the feasibility of DPAC by implementing a prototype, in which we migrate the widely used OpenSSH to DPAC and implement two example countermeasures.
引用
收藏
页码:475 / 478
页数:4
相关论文
共 50 条
  • [31] Security analysis and improvement of the efficient password-based authentication protocol
    Kwon, T
    Park, YH
    Lee, HJ
    [J]. IEEE COMMUNICATIONS LETTERS, 2005, 9 (01) : 93 - 95
  • [32] An improved smart card based password authentication scheme with provable security
    Xu, Jing
    Zhu, Wen-Tao
    Feng, Deng-Guo
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) : 723 - 728
  • [33] Password authentication key exchange based on key consensus for IoT security
    Zhao, Zongqu
    Ma, Shaoti
    Qin, Panke
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (01): : 837 - 846
  • [34] Cryptanalysis and security enhancement of two password authentication schemes with smart cards
    Khan, Muhammad Khurram
    [J]. INMIC 2007: PROCEEDINGS OF THE 11TH IEEE INTERNATIONAL MULTITOPIC CONFERENCE, 2007, : 74 - 77
  • [35] A Security and Efficiency Authentication Scheme Based on Human-memorable Password
    Cui, Jianming
    Zhang, Xiaojun
    Gao, Jianxin
    Cao, Ning
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 293 - 296
  • [36] Two-Factor Authentication with End-to-End Password Security
    Jarecki, Stanislaw
    Krawczyk, Hugo
    Shirvanian, Maliheh
    Saxena, Nitesh
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II, 2018, 10770 : 431 - 461
  • [37] A Security Improved Remote Password Authentication Scheme using Smart Card
    Jing, Chao
    [J]. EQUIPMENT MANUFACTURING TECHNOLOGY AND AUTOMATION, PTS 1-3, 2011, 317-319 : 1791 - 1796
  • [38] Password authentication key exchange based on key consensus for IoT security
    Zongqu Zhao
    Shaoti Ma
    Panke Qin
    [J]. Cluster Computing, 2023, 26 : 1 - 12
  • [39] Improving password security and memorability to protect personal and organizational information
    Vu, Kim-Phuong L.
    Proctor, Robert W.
    Bhargav-Spantzel, Abhilasha
    Tai, Bik-Lam
    Cook, Joshua
    Schultz, E. Eugene
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2007, 65 (08) : 744 - 757
  • [40] The Security of Modern Password Expiration: An Algorithmic Framework and Empirical Analysis
    Zhang, Yinqian
    Monrose, Fabian
    Reiter, Michael K.
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 176 - 186