An Efficient and Transparent One-Time Authentication Protocol with Non-Interactive Key Scheduling and Update

被引:9
作者
Castiglione, Arcangelo [1 ]
De Santis, Alfredo [1 ]
Castiglione, Aniello [1 ]
Palmieri, Francesco [2 ]
机构
[1] Univ Salerno, Dept Comp Sci, I-84084 Fisciano, SA, Italy
[2] Univ Naples 2, Dept Ind & Informat Engn, I-81031 Aversa, CE, Italy
来源
2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) | 2014年
关键词
One-Time Authentication; Efficient; Non-interactive; Key Scheduling; Key Setup; Key Update; Transparent; Standard Assumptions; OTA; OTP; PASSWORD AUTHENTICATION; SMART CARDS; SCHEME; SECURE; CRYPTANALYSIS;
D O I
10.1109/AINA.2014.45
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication protocols prevent resources to be accessed by unauthorized users. Password authentication is one of the simplest and most convenient authentication mechanism over insecure networks and, in particular, the one-time authentication mechanism, in which the password is valid only for one login session or transaction are a good compromise between simplicity of use and security. Nowadays many of such protocols have been proposed to implement that type of authentication. However, most of them have several drawbacks because they are characterized by considerable overhead in the Key Setup, Key Scheduling and Key Update phases. In addition, they are often vulnerable to several known attacks and are not particularly suitable to be used by mobile terminals. Furthermore, they often rely on smart-card and other hardware tokens, thus requiring an active participation by the user. In this paper, we present a robust one-time authentication protocol, based on two cryptographically strong building blocks, namely, the Authenticated Key Exchange key exchange and the keyed Hash Message Authentication Code (HMAC), that provides several advantages with respect to most of the available solutions at the state of the art. First, it enables transparent mutual authentication between two endpoints. Moreover, Key Setup, Key Scheduling and Key Update operations are accomplished independently by both endpoints, without requiring any interaction among them, thus ensuring the fully independence by any Trusted Third Party. Finally, the proposed protocol is cryptographically secure, under standard assumptions against most of the already known OTP attacks.
引用
收藏
页码:351 / 358
页数:8
相关论文
共 32 条
[1]  
[Anonymous], 1997, HMAC KEYED HASHING M, DOI DOI 10.17487/RFC2104
[2]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[3]  
Bertoni G., 2009, KECCAK SPONGE UNPUB, V3
[4]  
Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
[5]   REMOTE PASSWORD AUTHENTICATION WITH SMART CARDS [J].
CHANG, CC ;
WU, TC .
IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1991, 138 (03) :165-168
[6]   An efficient and practical solution to remote authentication: Smart card [J].
Chien, HY ;
Jan, JK ;
Tseng, YM .
COMPUTERS & SECURITY, 2002, 21 (04) :372-375
[7]  
Eastlake D., 2001, US Secure Hash Algorithm, V1
[8]   A novel one-time password mutual authentication scheme on sharing renewed finite random sub-passwords [J].
Gong, Longyan ;
Pan, Jingxin ;
Liu, Beibei ;
Zhao, Shengmei .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2013, 79 (01) :122-130
[9]  
Haller N., 1995, S KEY ONE TIME PASSW
[10]   Cryptanalysis of a remote login authentication scheme [J].
Hwang, MS .
COMPUTER COMMUNICATIONS, 1999, 22 (08) :742-744