期刊文献+

一个强口令认证方案的攻击与改进 被引量:6

Attacks and Improvements on a Strong-password Authentication Scheme
在线阅读 下载PDF
导出
摘要 讨论了于江等新近提出的一个简单高效的基于USB-Key的强口令认证方案(USPA),指出该方案无法实现所声称的抵抗DoS攻击、重放攻击、Stolen-Verifier攻击和服务器仿冒攻击。给出一个改进方案,并对其安全性和效率进行了详细的分析。结果表明,改进方案弥补了USPA的安全缺陷,并且保持了较高的效率,适用于安全需求较高的移动应用环境。 Recently Yu Jiang et al.proposed a USB-Key based strong-password authentication scheme(USPA),and claimed that their scheme was resistant to DoS attack,replay attack,stolen-verifier attack and server impersonation attack.However,we found USPA can't achive these purposes.An improved scheme was advanced and analyzed.The analysis shows that our new scheme precludes the defects of USPA,keeps the merit of high performance,and is suitable for mobile application scenarios where resource is constrained and security is concerned.
出处 《计算机科学》 CSCD 北大核心 2012年第6期72-76,共5页 Computer Science
基金 国家自然科学基金(61073042) 博士后科研人员落户黑龙江科研启动项目(LBH-Q10141) 北京邮电大学网络与交换技术国家重点实验室开放课题(SKLNST-2009-01-10)资助
关键词 强口令 认证 攻击 USB-KEY Strong-password Authentication Attack USB-Key
作者简介 汪定(1985-),男,硕士生,主要研究方向为密码学与无线网络安全,E-mail:wangdingg@mail.nankai.edu.cn; 马春光(1974-),男,博士,教授,主要研究方向为密码学与信息安全; 张启明(1987-),男,硕士生,主要研究方向为网络信息安全; 谷德丽(1983-),女,硕士生,主要研究方向为网络信息安全。
  • 相关文献

参考文献9

  • 1Sandirigama M, Shimizu A, Noda M T. Simple and secure pass- word authentication protocoll-J]. IEICE Transactions on Com-munications, 2000,E83(B) . 1363- 1365.
  • 2Lin C L, Sun H M, Hwang T. Attacks and solutions on strong- password authentication[-J]. IEICE Transactions on Communi- cations, 2001, E84 (B) . 2622-2627.
  • 3虞淑瑶,叶润国,张友坤,宋成.一种安全高效的强口令认证协议[J].计算机工程,2006,32(6):146-147. 被引量:5
  • 4Tsai C S, Lee C C, Hwang M S. Password Authentication Sche- mes: Current Status and Key IssuesEJ. International Journal of Network Security, 2006,3(2) : 101-115.
  • 5程英,高庆德.一个强口令认证协议的漏洞研究[J].计算机科学,2009,36(10):106-107. 被引量:2
  • 6于江,苏锦海,张永福.基于USB-Key的强口令认证方案设计与分析[J].计算机应用,2011,31(2):511-513. 被引量:5
  • 7秦小龙,杨义先.强口令认证协议的组合攻击[J].电子学报,2003,31(7):1043-1045. 被引量:10
  • 8Wang Y Y, Liu J, Xiao F, et al. A more efficient and secure dy- namic ID-based remote user authentication scheme[-J-]. Compu- ter Communications, 2009,32 (4) : 583-585.
  • 9Sandeep K S. Secure Dynamic Identity-Based Authentication Schenae Using Smart Cards[J. Information Security Journal: A Global Persoective, 2011,20(2) . 67-77.

二级参考文献26

  • 1李莉,薛锐,张焕国,冯登国,王丽娜.基于口令认证的密钥交换协议的安全性分析[J].电子学报,2005,33(1):166-170. 被引量:15
  • 2虞淑瑶,叶润国,张友坤,宋成.一种安全高效的强口令认证协议[J].计算机工程,2006,32(6):146-147. 被引量:5
  • 3Halevi S, Krawczyk H. Public-key Cryptography and Password Protocols[C] //Proceedings 5^th ACM Conference on Computer and Communications Security. San Francisco,CA, 1998:122-131.
  • 4Ku W C,Chen S M. Weaknesses and improvements of an efficient password base remote user authentication scheme using smart cards [J]. IEEE Transactions on Consumer Electronics, 2004,50(1) :204-206.
  • 5LAMPORT L. Password authentication with insecure communication [ J]. Communications of the ACM, 1981, 24(11) : 770 - 772.
  • 6HALLER N M. The S/KEY one-time password system[ C]// Proceedings of the Internet Society Symposium on Network and Distributed Systems. U S: RFC, 1995.
  • 7SHIMIZU A. A dynamic password authentication method by one-way function[ J]. Systems and Computers in Japan, 1991, 22(7) : 32 - 40.
  • 8TSUJI T, KAMIOKA T, SHIMIZU A. Simple and secure password authentication protocol (SAS) [J]. IEIC Technical Report, 2002, 102(314): 7-11.
  • 9SHIMIZU A, HORIOKA T, INAGAKI H. A password authentication methods for contents communication on the Internet[J]. IEICE Transactions on Communications, 1998, ESI - B(8) : 1666 - 1673.
  • 10LIN L, SUN H M, HWANG T. Attacks and solutions on strong- password authentication[J]. IEICE Transactions on Communications, 2001, E84-B(9): 2622-2627.

共引文献17

同被引文献47

  • 1郑海龙,刘建伟.一次性口令认证机制的分析与研究[J].信息安全与通信保密,2008,30(11):64-66. 被引量:8
  • 2高雪,张焕国,孙晓梅.一种改进的一次性口令认证方案[J].计算机应用研究,2006,23(6):127-128. 被引量:18
  • 3彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 4周洪波著.云计算实践指南丛书云计算:技术、应用、标准和商业模式.北京:电子工业出版社出版,2010.
  • 5Mell P,Grance T.The NIST Definition of Cloud Computing (Draft).National Institute of Standards and Technology (NIST),January 2011.
  • 6沈建苗.2013——混合云之年.http://www.cnw.com.cn/cloudgo2012/htm2013/20130104_262085.shtml,2012.
  • 7Ramgovind S,Eloff M M,Smith E.The management of security in cloud computing.Proceedings of IEEE Conference on Information Security for South Africa,South Africa,2010.
  • 8Hoover J N,Martin R.Demystifying the cloud.InformationWeek Research & Reports,December 2009.
  • 9Yah L,Rong C,Zhao G.Strengthen cloud computing security with federal identity management using hierarchical identitybased cryptography.Proceedings of the First International Conference on Cloud Computing,Beijing,China,2009:167~177.
  • 10Reede J.On a-select and federated identity management systems.Netherlands:University of Twente,2007.

引证文献6

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部