期刊文献+

对一个口令认证协议的可攻击性分析及改进 被引量:3

Attack Analysis and Improvement of Password Authentication Protocol
在线阅读 下载PDF
导出
摘要 RheeHS等人(Computer Standards & Interfaces,2009,No.1)提出的协议使用移动设备代替智能卡记忆数据降低风险和成本,但该协议仍存在一些不足。针对该问题,基于Chan-Cheng攻击案例,指出该协议难以抵抗假冒攻击和离线口令猜测攻击,为克服这些缺陷,给出一种改进方案,通过实验证明了该方案可以有效抵抗上述2种攻击,并能保证其口令的秘密性及身份认证的安全性。 Thel protocol proposed by Rhee H Set al(Computer Standards & Interfaces, 2009, No. 1) uses mobile equipment to replace smart card to reduce risk and cost, but it exists some demerits. Aiming at this problem, based on Chan-Chcng attack case, it points out that the protocol can not resist impersonation attack and off-line password guessing attack. In order to overcome these drawbacks, it gives the improved scheme. Experimental results show this scheme is strongly resistant to both of these attacks, which keeps the password secret and authenticating ID.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第7期142-143,146,共3页 Computer Engineering
基金 国家自然科学基金资助项目(10571061)
关键词 口令认证 智能卡 假冒攻击 离线口令猜测攻击 password authentication smart card impersonation attack off-line password guessing attack
  • 相关文献

参考文献4

  • 1Elgamal T. A Public Key Cryptosystems and a Signature Schemes Based on Discrete Logarithms[J]. IEEE Transactions on Information Theory, 1985, 31(4): 469-472.
  • 2Shamir A. Dentity-based Cryptosystems and Signature Schemes[C]// Proc. of CRYPTO'84. Berlin, Germany: [s. n.], 1984.
  • 3Chan J F. Smart Card-based Security Password Authentication Scheme[J]. Computers and Security, 1996, 15(3): 131-137.
  • 4Rhee H S, Jeong O K, Dong H, et al. A Remote User Authention Scheme Without Using Smart Cards[J]. Computer Standards & Interfaces, 2009, 31 ( 1 ): 6-13.

同被引文献19

  • 1陈淳鑫,阎光.MD5算法在B/S结构下口令验证中的应用[J].微型机与应用,2005,24(2):7-9. 被引量:6
  • 2侯孟波.基于身份和无证书的两方认证密钥协商协议研究[D].济南:山东大学,2010.4.
  • 3Michael S, Gene T, Michael W. Refinement and Extension of Encrypted Key Exchange[J]. ACM Operation System Review, 1995, 29(3): 22-33.
  • 4Lin Chunli, Sun Hongmin, Steiner M, et al. Three-party Encrypted Key Exchange Without Server Public-key[J]. IEEE Communi- cations Letters, 2001, 5(12): 497-499.
  • 5Lu Rongxing, Cao Zhenfu. Simple Three-party Key Exchange Protocol[J]. Computer and Security, 2007, 26(1): 94-97.
  • 6Bederson JB,Pitts LH,Tsuji M, et al. Rat middle Cerebral artery occlusion: evaluation of the mode and developxent of a neurologic examination. Stroke, 1986,17:472 - 476
  • 7Ch PH. Role of oxidants in ischemia brain damage. Stroke,1996,27:1124 - 1129
  • 8王天芹.基于口令的认证密钥交换协议[J].计算机工程,2008,34(14):4-6. 被引量:3
  • 9马刚勇,权建校,韩文报.安全口令生成器的设计与实现[J].信息安全与通信保密,2008,30(10):102-104. 被引量:1
  • 10赵铭伟,季晓玉,江荣安.一种高效安全的动态口令认证方案[J].计算机应用与软件,2009,26(5):255-257. 被引量:5

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部