Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks

被引:28
作者
Wang, Guilin [1 ]
Yu, Jiangshan [1 ]
Xie, Qi [2 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
[2] Hangzhou Normal Univ, Sch Informat Sci & Engn, Hangzhou 310036, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; distributed computer networks; information security; security analysis; single sign-on (SSO); EFFICIENT USER IDENTIFICATION; SCHEME; AUTHENTICATION; ANONYMITY;
D O I
10.1109/TII.2012.2215877
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential to be authenticated by multiple service providers in a distributed computer network. Recently, Chang and Lee proposed a new SSO scheme and claimed its security by providing well-organized security arguments. In this paper, however, we demonstrative that their scheme is actually insecure as it fails to meet credential privacy and soundness of authentication. Specifically, we present two impersonation attacks. The first attack allows a malicious service provider, who has successfully communicated with a legal user twice, to recover the user's credential and then to impersonate the user to access resources and services offered by other service providers. In another attack, an outsider without any credential may be able to enjoy network services freely by impersonating any legal user or a nonexistent user. We identify the flaws in their security arguments to explain why attacks are possible against their SSO scheme. Our attacks also apply to another SSO scheme proposed by Hsu and Chuang, which inspired the design of the Chang-Lee scheme. Moreover, by employing an efficient verifiable encryption of RSA signatures proposed by Ateniese, we propose an improvement for repairing the Chang-Lee scheme. We promote the formal study of the soundness of authentication as one open problem.
引用
收藏
页码:294 / 302
页数:9
相关论文
共 37 条
  • [1] [Anonymous], 2001, PUBL KEY CRYPT STAND
  • [2] [Anonymous], SEC FOR SINGL SIGN O
  • [3] Optimistic fair exchange of digital signatures
    Asokan, N
    Shoup, V
    Waidner, M
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2000, 18 (04) : 593 - 610
  • [4] Ateniese G., 2004, ACM Transactions on Information and Systems Security, V7, P1, DOI 10.1145/984334.984335
  • [5] Ateniese G, 2000, LECT NOTES COMPUT SC, V1880, P255
  • [6] JXTA-Overlay: A P2P Platform for Distributed, Collaborative, and Ubiquitous Computing
    Barolli, Leonard
    Xhafa, Fatos
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2011, 58 (06) : 2163 - 2172
  • [7] Bellare M., 1994, CRYPTO, P232
  • [8] Boneh D., 1999, NOT AM MATH SOC, V46, P203
  • [9] Boyd C., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P240
  • [10] Logic of authentication
    Burrows, Michael
    Abadi, Martin
    Needham, Roger
    [J]. Operating Systems Review (ACM), 1989, 23 (05): : 1 - 13