Authentication Scheme Using Honey Sentences

被引:0
作者
Rofiatunnajah, Nuril Kaunaini [1 ]
Barmawi, Ari Moesriami [1 ]
机构
[1] Telkom Univ, Sch Comp, Bandung, Indonesia
来源
ADVANCES IN INFORMATION AND COMMUNICATION, FICC, VOL 2 | 2023年 / 652卷
关键词
Authentication; Honey Sentences; Password-guessing Attack;
D O I
10.1007/978-3-031-28073-3_37
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Password-based authentication has dominated authentication schemes for decades because of its usability. However, password-based authentication is vulnerable to password-guessing attacks. To mitigate this attack, users have to choose a good password that is hard to guess. However, a password secured enough from password-guessing attacks will be difficult for users to memorize. One of the prior works that increase the complexity of password-guessing attacks without decreasing the usability is honey encryption (HE). HE produced a fake plausible-looking plaintext as the decoy message when the attacker guessed the incorrect password. Some research implements the HE into an authentication scheme. However, the authentication scheme using HE has some weaknesses. The decoy message just uses one word and is still suspicious to the attacker. All of the decoy messages also have to be stored in the database. To address these problems, we proposed an authentication system that used honey sentences as the confirmation message instead of a word. Honey sentence is dynamically generated using natural language and has to be natural enough to fool the attacker. When the attacker inputs the incorrect password, the honey sentence is returned to the attacker, such that he could not determine the correctness of the guessed password. The experiment result showed that 80,67% of the generated sentences are considered natural, and the complexity of finding the correct password from all possible passwords is higher than the previous methods.
引用
收藏
页码:521 / 540
页数:20
相关论文
共 12 条
  • [1] Anderson C., 2018, Essentials of Linguistics
  • [2] [Anonymous], HON ENCR
  • [3] [Anonymous], 1849, ENGL SURN 1849
  • [4] [Anonymous], NAME CORPUS
  • [5] The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
    Bonneau, Joseph
    Herley, Cormac
    van Oorschot, Paul C.
    Stajano, Frank
    [J]. 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 553 - 567
  • [6] Goldhahn D, 2012, LREC 2012 - EIGHTH INTERNATIONAL CONFERENCE ON LANGUAGE RESOURCES AND EVALUATION, P759
  • [7] Juels A, 2014, LECT NOTES COMPUT SC, V8441, P293, DOI 10.1007/978-3-642-55220-5_17
  • [8] Kbbi K.B.B.I., 2016, KAMUS BESAR BAHASA I
  • [9] Kurniawan S., 2020, 2020 5 INT C INFORMA, P1
  • [10] McCurley K. S., 1990, P S APPL MATH, P49