How to Speak an Authentication Secret Securely from an Eavesdropper

被引:0
|
作者
O'Gorman, Lawrence [1 ]
Brotman, Lynne [1 ]
Sammon, Michael [1 ]
机构
[1] Avaya Labs, Basking Ridge, NJ 07920 USA
来源
SECURITY PROTOCOLS | 2009年 / 5087卷
关键词
QUERY-DIRECTED PASSWORDS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
When authenticating over the telephone or mobile headphone, the user cannot always assure that no eavesdropper hears the password or authentication secret. We describe an eavesdropper-resistant, challenge-response authentication scheme for spoken authentication where an attacker can hear the user's voiced responses. This scheme entails the user to memorize a small number of plaintext-ciphertext pairs. At authentication, these are challenged in random order and interspersed with camouflage elements. It is shown that the response can be made to appear random so that no information on the memorized secret can be learned by eavesdroppers. We describe the method along with parameter value tradeoffs of security strength, authentication time, and memory effort. This scheme was designed for user authentication of wireless headsets used for hands-free communication by healthcare staff at a hospital.
引用
收藏
页码:215 / 229
页数:15
相关论文
共 50 条
  • [1] How to securely broadcast a secret
    Schwenk, J
    [J]. SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY, 1999, 23 : 247 - 257
  • [2] How To Speak about the Secret Desert Wars
    Coakley, Tom
    [J]. FOURTH GENRE-EXPLORATIONS IN NONFICTION, 2010, 12 (01) : 95 - 108
  • [3] SECURELY REPLICATING AUTHENTICATION SERVICES
    LI, G
    [J]. 9TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 1989, : 85 - 91
  • [4] Secret communication with a fading eavesdropper channel
    Li, Zang
    Yates, Roy
    Trappe, Wade
    [J]. 2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, : 1296 - 1300
  • [5] MIMO Secret Communications Against an Active Eavesdropper
    Li, Lingxiang
    Petropulu, Athina P.
    Chen, Zhi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (10) : 2387 - 2401
  • [6] HOW TO EXPOSE AN EAVESDROPPER
    RIVEST, RL
    SHAMIR, A
    [J]. COMMUNICATIONS OF THE ACM, 1984, 27 (04) : 393 - 395
  • [7] Homomorphic Authentication for Computing Securely on Untrusted Machines
    Fiore, Dario
    [J]. SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : XI - XIII
  • [8] YOUR PETS SECRET LANGUAGE - HOW TO UNDERSTAND AND SPEAK IT - ROBBINS,J
    ROSEN, K
    [J]. VERBATIM, 1975, 2 (02): : 15 - 15
  • [9] How to transform a business securely
    Ramachandran, Shivakumar
    [J]. ITNOW, 2019, 61 (02) : 18 - 19
  • [10] HOW TO SECURELY REPLICATE SERVICES
    REITER, MK
    BIRMAN, KP
    [J]. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1994, 16 (03): : 986 - 1009