A new protocol to counter online dictionary attacks

被引:11
作者
Goyal, V [1 ]
Kumar, V
Singh, M
Abraham, A
Sanyal, S
机构
[1] Banaras Hindu Univ, Grypto Grp, Varanasi 221005, Uttar Pradesh, India
[2] Chung Ang Univ, Sch Comp Sci & Engn, IITA Prof Program, Seoul, South Korea
关键词
authentication online dictionary attacks; hash functions; cryptographic protocol; passwords;
D O I
10.1016/j.cose.2005.09.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The most popular method of authenticating users is through passwords. Though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered by using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. In this paper, we propose an authentication protocol which is easy to implement without any infrastructural changes and yet prevents online dictionary attacks. our protocol uses only one way hash functions and eliminates online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it hardly poses any difficulty to a genuine user but is extremely burdensome, time consuming and computationally intensive for an adversary trying to launch as many as hundreds of thousands of authentication requests as in case of an online dictionary attack. The protocol is perfectly stateless and thus less vulnerable to denial of service (DOS) attacks. (c) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:114 / 120
页数:7
相关论文
共 13 条
[1]  
*ANSI, 1993, X930 ANSI
[2]  
Bellovin S. M., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P72, DOI 10.1109/RISP.1992.213269
[3]  
BENNY P, 2002, P 9 ACM C COMP COMM
[4]   CompChall: Addressing password guessing attacks [J].
Goyal, V ;
Kumar, V ;
Singh, M ;
Abraham, A ;
Sanyal, S .
ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 1, 2005, :739-744
[5]  
GOYAL V, 2004, UNPUB PASSWORD BASED
[6]  
GOYAL V, 2004, 2004097 CRYPT EPR AR
[7]  
Halevi Shai., 1999, ACM T INFORM SYST SE, P230
[8]  
KLEIN DV, 1990, P 2 USENIX WORKSH SE, P5
[9]   PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION [J].
LAMPORT, L .
COMMUNICATIONS OF THE ACM, 1981, 24 (11) :770-772
[10]   PASSWORD SECURITY - CASE HISTORY [J].
MORRIS, R ;
THOMPSON, K .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :594-597