Two-factor mutual authentication based on smart cards and passwords

被引:132
作者
Yang, Guomin [1 ]
Wong, Duncan S. [1 ]
Wang, Huaxiong [2 ]
Deng, Xiaotie [1 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[2] Nanyang Technol Univ, Sch Math & Phys Sci, Singapore, Singapore
关键词
Two-factor authentication; Password; Smart-card; Guessing attack; Dictionary attack;
D O I
10.1016/j.jcss.2008.04.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
One of the most commonly used two-factor user authentication mechanisms nowadays is based on smart-card and password. A scheme of this type is called a smart-card-based password authentication scheme. The core feature of such a scheme is to enforce two-factor authentication in the sense that the client must have the smart-card and know the password in order to gain access to the server. In this paper, we scrutinize the security requirements of this kind of schemes, and propose a new scheme and a generic construction framework for smart-card-based password authentication. We show that a secure password based key exchange protocol can be efficiently transformed to a smartcard-based password authentication scheme provided that there exist pseudorandom functions and target collision resistant hash functions. Our construction appears to be the first one with provable security. In addition, we show that two recently proposed schemes of this kind are insecure. (C) 2008 Elsevier Inc. All rights reserved.
引用
收藏
页码:1160 / 1172
页数:13
相关论文
共 29 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3376, P191
[3]  
[Anonymous], 1998, P 30 ANN ACM S THEOR
[4]  
Bellare M., 1995, Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing, P57, DOI 10.1145/225058.225084
[5]  
BELLARE M, 2000, LECT NOTES COMPUT SC, V1807
[6]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
[7]   An efficient and practical solution to remote authentication: Smart card [J].
Chien, HY ;
Jan, JK ;
Tseng, YM .
COMPUTERS & SECURITY, 2002, 21 (04) :372-375
[8]  
DIERKS T, 1999, 2246 IETF RFC
[9]   A DIGITAL SIGNATURE SCHEME SECURE AGAINST ADAPTIVE CHOSEN-MESSAGE ATTACKS [J].
GOLDWASSER, S ;
MICALI, S ;
RIVEST, RL .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :281-308
[10]  
Halevi S., 1999, ACM Trans. Inf. Syst. Secur, V2, P230