A new method for using hash functions to solve remote user authentication

被引:23
作者
Chen, Tzung-Her [2 ]
Lee, Wei-Bin [1 ]
机构
[1] Feng Chia Univ, Dept Informat Engn, Seatwen Taichung 407, Taiwan
[2] Natl Chiayi Univ, Dept Comp Sci & Informat Engn, Chiayi 600, Taiwan
关键词
user authentication; password; hash function; cryptography; mutual authentication;
D O I
10.1016/j.compeleceng.2007.01.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Peyravian and Zunic proposed the remote password authentication schemes only based on the coil is ion-resistant hash function. The schemes are, therefore, easy to implement and simple to use. The attractive properties cause a series of discussion. Several security flaws are found and remedied. Unfortunately, most of the remedies either are insecure or violate the original advantages because of involving public-key cryptosystems or modular exponential operations. Hence, it is still a challenge to design a secure scheme abiding by the beneficial assumption of the Peyravian-Zunic schemes. The proposed scheme not only keeps the original advantages (user friendness and computational cheapness) but also highlights certain of valuable features, such as (1) mutual authentication (higher security level), (2) server's ignorance of users' passwords (further security guaranee to users, specially for financial services), (3) immunity from maintaining security-sensitive table (maintaining burden reduction to servers), and so forth. (c) 2007 Elsevier Ltd. All rights reserved.
引用
收藏
页码:53 / 62
页数:10
相关论文
共 24 条
[21]  
Yang CC, 2003, IEICE T COMMUN, VE86B, P2178
[22]   Password authentication schemes with smart cards [J].
Yang, WH ;
Shieh, SP .
COMPUTERS & SECURITY, 1999, 18 (08) :727-733
[23]   Cryptanalysis and further improvement of Peinado's improved LHL-key authentication scheme [J].
Yoon, EJ ;
Ryu, EK ;
Yoo, KY .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (02) :788-794
[24]  
YOON EJ, 2004, ACM OPERATING SYSTEM, V38, P62