Improvement of the Peyravian-Jeffries's user authentication protocol and password change protocol

被引:7
|
作者
Hoelbl, Marko [1 ]
Welzer, Tatjana [1 ]
Brumen, Bostjan [1 ]
机构
[1] Univ Maribor, Fac Elect Engn & Comp Sci, SLO-2000 Maribor, Slovenia
关键词
authentication; hash; off-line password guessing attack; password; security;
D O I
10.1016/j.comcom.2007.12.029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Remote authentication of users supported by passwords is a broadly adopted method of authentication within insecure network environments. Such protocols typically rely on pre-established secure cryptographic keys or public key infrastructure. Recently, Peyravian and Jeffries [M. Peyravian, C. Jeffries, Secure remote user access over insecure networks, Computer Communications 29 (5-6) (2006) 660-667] proposed a protocol for secure remote user access over insecure networks. Shortly after the protocol was published Shim [K.A. Shim, Security flaws of remote user access over insecure networks, Computer Communications 30 (1) (2006) 117-121] and Munilla et al. [J. Munilla, A. Peinado, Off-line password-guessing attack to Peyravian-Jeffries's remote user authentication protocol, Computer Communications 30 (1) (2006) 52-54] independently presented an off-line guessing attack on the protocol. Based on their findings we present an improved secure password-based protocol for remote user authentication, password change, and session key establishment over insecure networks, which is immune against the attack. (C) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:1945 / 1951
页数:7
相关论文
共 50 条
  • [21] A secure strong-password authentication protocol
    Wu, HC
    Hwang, MS
    Liu, CH
    FUNDAMENTA INFORMATICAE, 2005, 68 (04) : 399 - 406
  • [22] Protecting Password Piracy using Authentication Protocol
    Subhashini, K.
    Bhuvaneswari, M. S.
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 116 - 119
  • [23] A Protocol to Strengthen Password-Based Authentication
    Sandoval, Itzel Vazquez
    Stojkovski, Borce
    Lenzini, Gabriele
    EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2018, 2018, 11263 : 38 - 46
  • [24] A secure user authentication protocol based on one-time-password for home network
    Jo, HS
    Youn, HY
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 1, 2005, 3480 : 519 - 528
  • [25] An Improved Password-Based Remote User Authentication Protocol without Smart Cards
    Jiang, Qi
    Ma, Jianfeng
    Li, Guangsong
    Ma, Zhuo
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (02): : 150 - 158
  • [26] Cryptanalysis and Improvement of Chandrakar and Om's Remote User Authentication Protocol for the Multiserver Environment
    Chen, Chien-ming
    Xiang, Bin
    Wang, Guang-jie
    Huang, Yan-yu
    2018 INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK AND ARTIFICIAL INTELLIGENCE (CNAI 2018), 2018, : 125 - 130
  • [27] Cryptanalysis of a User Authentication Protocol
    Tan, Zuowen
    2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 27 - 30
  • [28] Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol
    Jeong, Hanjae
    Won, Dongho
    Kim, Seungjoo
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (05) : 1845 - 1858
  • [29] Attack and improvement on the one-time password authentication protocol against theft attacks
    Kuo, Wen-Chung
    Lee, Yung-Cheng
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 1918 - +
  • [30] Improvements to Mitchell's remote user authentication protocol
    Goyal, Vipul
    Jain, Abhishek
    Quisquater, Jean Jacques
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005, 2006, 3935 : 69 - 80