Improvement of the Peyravian-Jeffries's user authentication protocol and password change protocol

被引:7
|
作者
Hoelbl, Marko [1 ]
Welzer, Tatjana [1 ]
Brumen, Bostjan [1 ]
机构
[1] Univ Maribor, Fac Elect Engn & Comp Sci, SLO-2000 Maribor, Slovenia
关键词
authentication; hash; off-line password guessing attack; password; security;
D O I
10.1016/j.comcom.2007.12.029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Remote authentication of users supported by passwords is a broadly adopted method of authentication within insecure network environments. Such protocols typically rely on pre-established secure cryptographic keys or public key infrastructure. Recently, Peyravian and Jeffries [M. Peyravian, C. Jeffries, Secure remote user access over insecure networks, Computer Communications 29 (5-6) (2006) 660-667] proposed a protocol for secure remote user access over insecure networks. Shortly after the protocol was published Shim [K.A. Shim, Security flaws of remote user access over insecure networks, Computer Communications 30 (1) (2006) 117-121] and Munilla et al. [J. Munilla, A. Peinado, Off-line password-guessing attack to Peyravian-Jeffries's remote user authentication protocol, Computer Communications 30 (1) (2006) 52-54] independently presented an off-line guessing attack on the protocol. Based on their findings we present an improved secure password-based protocol for remote user authentication, password change, and session key establishment over insecure networks, which is immune against the attack. (C) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:1945 / 1951
页数:7
相关论文
共 50 条
  • [1] SECURITY ANALYSIS OF PEYRAVIAN-JEFFRIES'S REMOTE USER AUTHENTICATION PROTOCOL
    Guo, Yongning
    Liu, Chenglian
    2011 3RD INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT (ICCTD 2011), VOL 1, 2012, : 767 - 771
  • [2] Off-line pas sword-guessing attack to Peyravian-Jeffries's remote user authentication protocol
    Munilla, J.
    Peinado, A.
    COMPUTER COMMUNICATIONS, 2006, 30 (01) : 52 - 54
  • [3] Improvement on Peyravian-Zunic's password authentication schemes
    Hwang, JJ
    Yeh, TC
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2002, E85B (04) : 823 - 825
  • [4] oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks
    Sun, Hung-Min
    Chen, Yao-Hsin
    Lin, Yue-Hsun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 651 - 663
  • [5] ProcurePass: A User Authentication Protocol to Resist Password Stealing and Password Reuse Attack
    Kassim, Mariam M.
    Sujitha, A.
    2013 INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI), 2013, : 31 - 34
  • [6] Password-based user authentication protocol for mobile environment
    Moon, Sung-Won
    Kim, Young-Gab
    Moon, Chang-Joo
    Baik, Doo-Kwon
    Information Networking: ADVANCES IN DATA COMMUNICATIONS AND WIRELESS NETWORKS, 2006, 3961 : 743 - 753
  • [7] Attack and Improvement of the Secure Password Authentication Protocol in Wireless Networks
    Lee, Yung-Cheng
    OPTICAL, ELECTRONIC MATERIALS AND APPLICATIONS, PTS 1-2, 2011, 216 : 506 - 509
  • [8] User Anonymous Authentication Key Exchange Protocol Based on Biometrics and Password
    Cao, Fengkuan
    Wei, Wenxve
    2022 IEEE 6TH ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2022, : 1344 - 1350
  • [9] User authentication protocol based on human memorable password and using ECC
    Park, SB
    Kang, MS
    Lee, SJ
    GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 1091 - 1094
  • [10] User authentication protocol based on human memorable password and using RSA
    Park, I
    Park, S
    Oh, B
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 698 - 707