Improvement of the Peyravian-Jeffries's user authentication protocol and password change protocol

被引:7
|
作者
Hoelbl, Marko [1 ]
Welzer, Tatjana [1 ]
Brumen, Bostjan [1 ]
机构
[1] Univ Maribor, Fac Elect Engn & Comp Sci, SLO-2000 Maribor, Slovenia
关键词
authentication; hash; off-line password guessing attack; password; security;
D O I
10.1016/j.comcom.2007.12.029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Remote authentication of users supported by passwords is a broadly adopted method of authentication within insecure network environments. Such protocols typically rely on pre-established secure cryptographic keys or public key infrastructure. Recently, Peyravian and Jeffries [M. Peyravian, C. Jeffries, Secure remote user access over insecure networks, Computer Communications 29 (5-6) (2006) 660-667] proposed a protocol for secure remote user access over insecure networks. Shortly after the protocol was published Shim [K.A. Shim, Security flaws of remote user access over insecure networks, Computer Communications 30 (1) (2006) 117-121] and Munilla et al. [J. Munilla, A. Peinado, Off-line password-guessing attack to Peyravian-Jeffries's remote user authentication protocol, Computer Communications 30 (1) (2006) 52-54] independently presented an off-line guessing attack on the protocol. Based on their findings we present an improved secure password-based protocol for remote user authentication, password change, and session key establishment over insecure networks, which is immune against the attack. (C) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:1945 / 1951
页数:7
相关论文
共 50 条
  • [31] An Authentication Protocol Fusing User's and Server's Data
    Cheng Yuanbin
    PROCEEDINGS OF THE NINTH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE (DCABES 2010), 2010, : 484 - 486
  • [32] Security analysis and improvement of a user-friendly remote authentication protocol
    Wang, YJ
    Li, JH
    Tie, L
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 47 - 50
  • [33] Cookie-Based Virtual Password Authentication Protocol
    Sood, Sandeep K.
    INFORMATION SECURITY JOURNAL, 2011, 20 (02): : 100 - 111
  • [34] A steady on the generalized key agreement and password authentication protocol
    Kwon, T
    Song, J
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2000, E83B (09) : 2044 - 2050
  • [35] An improved protocol for password authentication using smart cards
    Cheng, Zi-Yao
    Liu, Yun
    Chang, Chin-Chen
    Chang, Shih-Chang
    Journal of Computers, 2012, 22 (04): : 29 - 37
  • [36] Advanced smart card based password authentication protocol
    Song, Ronggong
    COMPUTER STANDARDS & INTERFACES, 2010, 32 (5-6) : 321 - 325
  • [37] An improvement of a deniable authentication protocol
    Hsieh, BT
    Sun, HM
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (10) : 3099 - 3101
  • [38] Guessing attacks on strong-password authentication protocol
    Lee, Cheng-Chi
    Liu, Chia-Hsin
    Hwang, Min-Shiang
    International Journal of Network Security, 2013, 15 (01) : 64 - 67
  • [39] A password based authentication protocol for access control in WLAN
    Liu, JX
    Tang, BH
    Liu, Y
    Liu, C
    Liu, YA
    International Symposium on Communications and Information Technologies 2005, Vols 1 and 2, Proceedings, 2005, : 1099 - 1102
  • [40] Password recovery attack to authentication post office protocol
    School of Computer, National University of Defense Technology, Changsha 410073, China
    不详
    Liu, F.-B. (liufanbao@gmail.com), 1927, Science Press (35):