Improvement of the Peyravian-Jeffries's user authentication protocol and password change protocol

被引:7
|
作者
Hoelbl, Marko [1 ]
Welzer, Tatjana [1 ]
Brumen, Bostjan [1 ]
机构
[1] Univ Maribor, Fac Elect Engn & Comp Sci, SLO-2000 Maribor, Slovenia
关键词
authentication; hash; off-line password guessing attack; password; security;
D O I
10.1016/j.comcom.2007.12.029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Remote authentication of users supported by passwords is a broadly adopted method of authentication within insecure network environments. Such protocols typically rely on pre-established secure cryptographic keys or public key infrastructure. Recently, Peyravian and Jeffries [M. Peyravian, C. Jeffries, Secure remote user access over insecure networks, Computer Communications 29 (5-6) (2006) 660-667] proposed a protocol for secure remote user access over insecure networks. Shortly after the protocol was published Shim [K.A. Shim, Security flaws of remote user access over insecure networks, Computer Communications 30 (1) (2006) 117-121] and Munilla et al. [J. Munilla, A. Peinado, Off-line password-guessing attack to Peyravian-Jeffries's remote user authentication protocol, Computer Communications 30 (1) (2006) 52-54] independently presented an off-line guessing attack on the protocol. Based on their findings we present an improved secure password-based protocol for remote user authentication, password change, and session key establishment over insecure networks, which is immune against the attack. (C) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:1945 / 1951
页数:7
相关论文
共 50 条
  • [21] A Threshold Multi-Server Protocol for Password-Based Authentication
    Guan, Mengxiang
    Song, Jiaxing
    Liu, Weidong
    2016 IEEE 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2016, : 108 - 118
  • [22] An improvement of the password-based authentication protocol (K1P) on security against replay attacks
    Kwon, T
    Kang, M
    Jung, S
    Song, J
    IEICE TRANSACTIONS ON COMMUNICATIONS, 1999, E82B (07) : 991 - 997
  • [23] An Improved User Authentication Protocol for IoT
    Cui, Jianming
    Zhang, Zuowen
    Li, Hengzhong
    Sui, Rongquan
    2018 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC 2018), 2018, : 59 - 62
  • [24] Enhanced the user's anonymity on the smart card based user authentication protocol
    Lin, Iuon-Chang
    Chang, Tsai-Ling
    ICIC Express Letters, 2012, 6 (06): : 1507 - 1511
  • [25] Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments
    Chung, Hao-Rung
    Ku, Wei-Chi
    Tsaur, Maw-Jinn
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) : 863 - 868
  • [26] Efficient Two-Factor Authentication Protocol Using Password and Smart Card
    Liu, Fenghua
    JOURNAL OF COMPUTERS, 2013, 8 (12) : 3257 - 3263
  • [27] Password-based independent authentication and key exchange protocol
    Jung, KS
    Kim, JY
    Chung, TC
    ICICS-PCM 2003, VOLS 1-3, PROCEEDINGS, 2003, : 1908 - 1912
  • [28] Conformal Chebyshev chaotic map-based remote user password authentication protocol using smart card
    Meshram, Chandrashekhar
    Meshram, Sarita Gajbhiye
    Ibrahim, Rabha W.
    Jalab, Hamid A.
    Jamal, Sajjad Shaukat
    Barve, Sharad Kumar
    COMPLEX & INTELLIGENT SYSTEMS, 2022, 8 (02) : 973 - 987
  • [29] An ECC Based Remote User Authentication Protocol
    Shafiq, Akasha
    Altaf, Izwa
    Mahmood, Khalid
    Kumari, Saru
    Chen, Chien-Ming
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (01): : 285 - 294
  • [30] Multi User Authentication Protocol Using Visual Sceret Sharing
    Prakasha, Krishna K.
    Muniyal, Balachandra
    Srushti
    Shetty, Deeksha
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 876 - 879