PDM: A new strong password-based protocol

被引:0
|
作者
Kaufman, C
Perlman, R
机构
来源
USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM | 2001年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we present PDM (Password Derived Moduli), a new approach to strong password-based protocols usable either for mutual authentication or for downloading security information such as the user's private key. We describe how the properties desirable for strong password mutual authentication differ from the properties desirable for credentials download, In particular, a protocol used solely for credentials download can be simpler and less expensive than one used for mutual authentication since some properties (such as authentication of the server) are not necessary for credentials download. The features necessary for mutual authentication can be easily added to a credentials download protocol, but many of the protocols designed for mutual authentication are not as desirable for use in credentials download as protocols like PDM and basic EKE and SPEKE because they are unnecessarily expensive when used for that purpose, PDM's performance is vastly more expensive at the client than any of the protocols in the literature, but it is more efficient at the server. We claim that performance at the server, since a server must handle a large and potentially unpredictable number of clients, is more important than performance at the client, assuming that client performance is "good enough". We describe PDM for credentials download, and then show how to enhance it to have the proper-ties desirable for mutual authentication. In particular, the enhancement we advocate for allowing PDM to avoid storing a password-equivalent at the server is less expensive than existing schemes, and our approach can be used as a more efficient (at the server) variant of augmented EKE and SPEKE than the currently published schemes. PDM is important because it is a very different approach to the problem than any in the literature, we believe it to be unencumbered by patents, and because it can be a lot less expensive at the server than existing schemes.
引用
收藏
页码:313 / 321
页数:9
相关论文
共 50 条
  • [1] A Protocol to Strengthen Password-Based Authentication
    Sandoval, Itzel Vazquez
    Stojkovski, Borce
    Lenzini, Gabriele
    EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2018, 2018, 11263 : 38 - 46
  • [2] A New Anonymous Password-Based Authenticated Key Exchange Protocol
    Yang, Jing
    Zhang, Zhenfeng
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 200 - 212
  • [3] Password-based independent authentication and key exchange protocol
    Jung, KS
    Kim, JY
    Chung, TC
    ICICS-PCM 2003, VOLS 1-3, PROCEEDINGS, 2003, : 1908 - 1912
  • [4] A Simple Password-based Authenticated Key Agreement Protocol
    Lee, Yung-Cheng
    OPTICAL, ELECTRONIC MATERIALS AND APPLICATIONS, PTS 1-2, 2011, 216 : 510 - 513
  • [5] An efficient satellite CAS using password-based protocol
    Kim, Y
    Yu, J
    Won, D
    PROCEEDINGS OF THE FIFTH JOINT CONFERENCE ON INFORMATION SCIENCES, VOLS 1 AND 2, 2000, : 607 - 610
  • [6] Efficient password-based authenticated key agreement protocol
    Lee, SW
    Kim, WH
    Kim, HS
    Yoo, KY
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 617 - 626
  • [7] Password-based user authentication protocol for mobile environment
    Moon, Sung-Won
    Kim, Young-Gab
    Moon, Chang-Joo
    Baik, Doo-Kwon
    Information Networking: ADVANCES IN DATA COMMUNICATIONS AND WIRELESS NETWORKS, 2006, 3961 : 743 - 753
  • [8] Cryptanalysis and improvement of a password-based key exchange protocol
    Liu, Feng-Mei
    Luo, Shi-Xin
    Ren, Chuan-Lun
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3668 - +
  • [9] Practical password-based authenticated key exchange protocol
    Wu, Shuhua
    Zhu, Yuefei
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 523 - 533
  • [10] Overcome weakness of a password-based group key agreement protocol
    Dutta, Ratna
    2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 13 - 18