A Secure Hash-Based Strong-Password Authentication Protocol Using One-Time Public-Key Cryptography
نویسندگان
چکیده
Secure communication is an important issue in networks and user authentication is a very important part of the security. Several strong-password authentication protocols have been introduced, but there is no fully secure authentication scheme that can resist all known attacks. We propose enhanced secure schemes with registration and login protocols, and add the “forget password” and password/verifier change protocols. We show that our scheme is more secure against guessing, stolen-verifier, replay, denial-ofservice, and impersonation attacks than previously introduced protocols.
منابع مشابه
An Efficient Password Security of Multi-Party Key Exchange Protocol based on ECDLP
In this paper we have proposed an efficient password security of multiparty Key Exchange Protocol based on Elliptic Curve Discrete Logarithm Problem. Key exchange protocols allow a group of parties communicating over a public network to establish a common secret key called session key. Due to their significance by in building a secure communication channel, a number of key exchange protocols ha...
متن کاملA Hash-based Strong Password Authentication Protocol with User Anonymity
Password authentication protocols range from complex public-key cryptosystems to simple hash-based password authentication schemes. One common feature of these protocols is that the user’s identity is transmitted in plain during the authentication process, which allows an attacker to monitor the user’s activities. In many cases, the user’s anonymity is a desirable security feature. In this pape...
متن کاملA Chaining Authentication Scheme Using S/Key OTP Based on a Fast and Secure Hash Algorithm in Wireless Sensor Networks
Security is another important aspect and its development has enhanced widespread adoption of WSNs. In a typical situation, user wants to access the data directly from a node instead of accessing at the gateway or at the backend of an application system. Therefore, it is necessary that such an access is allowed only to a registered user. Recently, 3-way chaining authentication scheme which uses ...
متن کاملOne-Time Password Authentication Scheme to Solve Stolen Verifier Problem
Secure authentication schemes between an authentication server and users are required to avoid many risks on the Internet. There are three authentication schemes: static password authentications like Basic and Digest Access Authentication[1], public-key certificate schemes, and one-time password schemes. In spite of using SSL/TLS, the static password authentications are known as being insecure ...
متن کاملMitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions
Password-Authenticated Key Exchange allows users to generate a strong cryptographic key based on a shared “human-memorable” password without requiring a public-key infrastructure. It is one of the most widely used and fundamental cryptographic primitives. Unfortunately, mass password theft from organizations is continually in the news and, even if passwords are salted and hashed, brute force br...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. Inf. Sci. Eng.
دوره 24 شماره
صفحات -
تاریخ انتشار 2008