Opportunistic protected login: Next step in traditional password based user authentication
نویسنده
چکیده
Password based authentication faces security related threats from phishing, server compromise and man-inthe-middle attack. Despite the poor security, it has been the primary method of user authentication on web since a decade now. This paper is a systematic review of a proposal, by Czeskis et al., which aims to provide opportunistic protected login for user authentication, for web services without changing user experience. This proposal involves using a personal device, other then the machine on which user is accessing the service, as a second factor authentication device. In addition, this solution involves using public key cryptography to provide secure channel, between client and server, to which authentication tokens can be attached. The solution aims not only to make first login secure but also prevent user from phishing and certain variants of man-in-the-middle attack. In addition to discussing the proposal, this paper is an effort at evaluating the assumptions, threat model and assembling open problems related to proposal. Keywords-Communication system security; Information security; Authentication;
منابع مشابه
Doodles for Authentication: Recognition and User Study Results
Traditional means of computer based authentication based on username and password combinations become unwieldy as the number of password accounts one manages increases. The average computer user needs to remember a large number of text username and password combinations for different applications, which places a large cognitive load on the user. While biometric login based systems can free the ...
متن کاملProtected Login
Despite known problems with their security and ease-of-use, passwords will likely continue to be the main form of web authentication for the foreseeable future. We define a certain class of password-based authentication protocols and call them protected login. Protected login mechanisms present reasonable security in the face of real-world threat models. We find that some websites already emplo...
متن کاملOn the Remote Authentication with Self - Protected Smart Cards 植基於具自保功能智慧卡之遠端認證機制
Smart card is a secure device for remote authentication. However, if cardholders lost their card, attackers always can successfully guess passwords and impersonate legal users to login. In 2004, Lee et al. proposed a remote authentication scheme with smart cards. In this paper, we first show that their scheme cannot withstand the guessing attack. If attackers obtain the card, they can successfu...
متن کاملIntegration of Sound Signature and Graphical Password Authentication System
A graphical password system with a supportive sound signature and video clip to enhance the security level in authentication system and it is cued click point based system. In this system password consist of graphical images in which user can select one cued click-point per image and video clip for authentication. Systems shared very good performance in term of speed, accuracy and enhance the s...
متن کاملInverse Cookie-based Virtual Password Authentication Protocol
Password is the most commonly used authentication technique to authenticate the users on the web. Password based authentication protocols are susceptible to dictionary attacks by means of automated programs because most of the user chosen passwords are limited to the user’s personal domain. In this paper, we propose an inverse cookie based virtual password authentication protocol that preserves...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013