Security analysis and improvement of the efficient password-based authentication protocol

被引:8
|
作者
Kwon, T [1 ]
Park, YH
Lee, HJ
机构
[1] Sejong Univ, Fac Sch Comp Engn, Seoul, South Korea
[2] Sejong Cyber Univ, Seoul, South Korea
[3] Kangnam Univ, Fac Dept Math, Yongin, South Korea
关键词
information security; authentication protocol; security analysis;
D O I
10.1109/LCOMM.2005.01032
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We analyze and improve the security of the efficient password-based authentication protocol that has been proposed recently in the Australasian Conference on Information Security and Privacy (ACISP) 2003. Its distinct idea is to utilize two generators of a certain cyclic group for efficiency, while the protocol is vulnerable to the server compromise attack on the contrary to the original assumption. Fortunately, we improve its security in this paper and also remark on its extended version called EPA+.
引用
下载
收藏
页码:93 / 95
页数:3
相关论文
共 50 条
  • [21] Secure password-based authentication in WLAN
    Keshava, M.
    Journal of the Indian Institute of Science, 2006, 86 (04) : 389 - 396
  • [22] Password-Based Authentication Protocol for Secret-Sharing-Based Multiparty Computation
    Kikuchi, Ryo
    Chida, Koji
    Ikarashi, Dai
    Hamada, Koki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01) : 51 - 63
  • [23] Securing Password in Static Password-based Authentication: A Review
    Mohamedali, Intisar A.
    Fadlalla, Yahia
    PROCEEDINGS OF 2017 SUDAN CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (SCCSIT), 2017, : 98 - 102
  • [24] A Four-Party Password-based Authentication Key Exchange Protocol
    Liu, Xiumei
    Liu, Junjiang
    Chang, Guiran
    2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, : 280 - 283
  • [25] Neuromuscular Password-Based User Authentication
    Jiang, Xinyu
    Xu, Ke
    Liu, Xiangyu
    Dai, Chenyun
    Clifton, David A.
    Clancy, Edward A.
    Akay, Metin
    Chen, Wei
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (04) : 2641 - 2652
  • [26] Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation
    Kikuchi, Ryo
    Chida, Koji
    Ikarashi, Dai
    Hamada, Koki
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 179 - 196
  • [27] PASTA: PASsword-based Threshold Authentication
    Agrawal, Shashank
    Miao, Peihan
    Mohassel, Payman
    Mukherjee, Pratyay
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2042 - 2059
  • [28] On Unlinkability of Password-Based Anonymous Authentication
    Shin, SeongHan
    Kobara, Kazukuni
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (06) : 1320 - 1324
  • [29] Efficient and secure password-based authentication protocols against guessing attacks
    Kwon, T
    Song, J
    COMPUTER COMMUNICATIONS, 1998, 21 (09) : 853 - 861
  • [30] Cryptanalysis of an efficient password-based group key agreement protocol
    Yuan, Wei
    Hu, Liang
    Li, Hongtu
    Chu, Jianfeng
    CEIS 2011, 2011, 15