ZERO KNOWLEDGE PASSWORD AUTHENTICATION PROTOCOL
نویسندگان
چکیده
منابع مشابه
Zero Knowledge Password Authentication Protocol
In many applications, the password is sent as cleartext to the server to be authenticated thus providing the eavesdropper with opportunity to steal valuable data. This paper presents a simple protocol based on zero knowledge proof by which the user can prove to the authentication server that he has the password without having to send the password to the server as either cleartext or in encrypte...
متن کاملDestructible Password Functionality Authentication Protocol
One of the biggest challenges that face the use of password as a security token is its low entropy. Researchers have proposed a cryptographic approach in an attempt to strengthen the security of password systems. In this paper, we investigate a new approach using irreducible polynomial in prime field GF (2) to build a secure password system that transforms the text of the password with every tr...
متن کاملM-Pin: A Multi-Factor Zero Knowledge Authentication Protocol
Here we introduce the M-Pin client-server protocol, which features two-factor client authentication as an alternative to Username/Password. Despite the mathematical complexity of the protocol we demonstrate that an M-Pin client can be implemented in an environment with limited computational capability.
متن کاملPost-Quantum Cryptography: A Zero-Knowledge Authentication Protocol
In this paper, we present a simple bare-bones solution of a Zero-Knowledge authentication protocol which uses non-commutative algebra and a variation of the generalized symmetric decomposition problem (GSDP) as a one-way function. The cryptographic security is assured as long the GSDP problem is computationally hard to solve in non-commutative algebraic structures and belongs currently to the P...
متن کاملAn Anti-Phishing Password Authentication Protocol
Password authentication is commonly used to authenticate the user in web-based services such as internet banking due to its simplicity and convenience. Many users have multiple accounts and use the same password. The password is usually sent to the server over an HTTPS connection. However, this common practice makes the system vulnerable. An attacker can set up a phishing site masquerading as t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Communication Networks and Security
سال: 2012
ISSN: 2231-1882
DOI: 10.47893/ijcns.2012.1047