A new method for using hash functions to solve remote user authentication

被引:23
作者
Chen, Tzung-Her [2 ]
Lee, Wei-Bin [1 ]
机构
[1] Feng Chia Univ, Dept Informat Engn, Seatwen Taichung 407, Taiwan
[2] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi 600, Taiwan
关键词
user authentication; password; hash function; cryptography; mutual authentication;
D O I
10.1016/j.compeleceng.2007.01.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Peyravian and Zunic proposed the remote password authentication schemes only based on the coil is ion-resistant hash function. The schemes are, therefore, easy to implement and simple to use. The attractive properties cause a series of discussion. Several security flaws are found and remedied. Unfortunately, most of the remedies either are insecure or violate the original advantages because of involving public-key cryptosystems or modular exponential operations. Hence, it is still a challenge to design a secure scheme abiding by the beneficial assumption of the Peyravian-Zunic schemes. The proposed scheme not only keeps the original advantages (user friendness and computational cheapness) but also highlights certain of valuable features, such as (1) mutual authentication (higher security level), (2) server's ignorance of users' passwords (further security guaranee to users, specially for financial services), (3) immunity from maintaining security-sensitive table (maintaining burden reduction to servers), and so forth. (c) 2007 Elsevier Ltd. All rights reserved.
引用
收藏
页码:53 / 62
页数:10
相关论文
共 24 条
[1]   A REMOTE PASSWORD AUTHENTICATION SCHEME BASED UPON ELGAMALS SIGNATURE SCHEME [J].
CHANG, CC ;
LIAO, WY .
COMPUTERS & SECURITY, 1994, 13 (02) :137-144
[2]   USING SMART CARDS TO AUTHENTICATE REMOTE PASSWORDS [J].
CHANG, CC ;
HWANG, SJ .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1993, 26 (07) :19-27
[3]  
CHANG YF, 2004, IEICE T COMMUN, V87, P2178
[4]  
Cheng-Chi Lee, 2002, Operating Systems Review, V36, P23, DOI 10.1145/583800.583803
[5]  
Haller N. M., 1994, Proceedings Internet Society Symposium on Network and Distributed System Security 1994, P151
[6]  
Hwang JJ, 2002, IEICE T COMMUN, VE85B, P823
[7]   A new remote user authentication scheme using smart cards [J].
Hwang, MS ;
Li, LH .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) :28-30
[8]   Paramita wisdom password authentication scheme without verification tables [J].
Jan, JK ;
Chen, YY .
JOURNAL OF SYSTEMS AND SOFTWARE, 1998, 42 (01) :45-57
[9]  
Ku WC, 2003, IEICE T COMMUN, VE86B, P1682
[10]  
KU WC, 2005, ACM OPERATING SYSTEM, V39, P85