Secure password authentication for distributed computing

被引:0
作者
Jung, Scung Wook [1 ]
Jung, Souhwan [1 ]
机构
[1] Soongsil Univ, Commun Network Secur Lab, Seoul 256743, South Korea
来源
COMPUTATIONAL INTELLIGENCE AND SECURITY | 2007年 / 4456卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper describes secure password-based authentication involving a trusted third party, while the previous secure password anthentication schemes focused on authentication involving two parties who shares the password. Kerberos is a well-known password-based authentication protocol involving a trusted third party. However, Kerberos is weak against the dictionary attack, suffers from a, single point of failure. Additionally, Kerberos cannot provide a forward secrecy, which protects past sessions and further compromise, when a password is revealed. Our password authentication schemes provides Single Sign On like Kerberos and is secure against on/off-line dictionary attack. Moreover, The schemes provide a forward secrecy, and reduces the damage of the single point of failure.
引用
收藏
页码:491 / 501
页数:11
相关论文
共 16 条
[1]  
Bellovin S. M., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P72, DOI 10.1109/RISP.1992.213269
[2]  
Bellovin SM, 1993, P CCS, P244
[3]  
BELLOVIN SM, 1991, LIMITATIONS KERBEROS, P253
[4]  
Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
[5]  
Dierks T., 1999, TLS PROTOCOL VERSION
[6]  
Diffie W., 1992, Designs, Codes and Cryptography, V2, P107, DOI 10.1007/BF00124891
[7]  
GNTHER CG, 1990, ADV CRYPTOLOGY EUROC, V434, P29
[8]  
GONG L, 1995, P 8 IEEE COMP SEC FD, P24
[9]  
HOUSLEY SR, 2002, INTERNET ATTRIBUTE P
[10]  
*IETF, 2000, IETF INT SEC GLOSS