Improvement of the Peyravian-Jeffries's user authentication protocol and password change protocol

被引:7
|
作者
Hoelbl, Marko [1 ]
Welzer, Tatjana [1 ]
Brumen, Bostjan [1 ]
机构
[1] Univ Maribor, Fac Elect Engn & Comp Sci, SLO-2000 Maribor, Slovenia
关键词
authentication; hash; off-line password guessing attack; password; security;
D O I
10.1016/j.comcom.2007.12.029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Remote authentication of users supported by passwords is a broadly adopted method of authentication within insecure network environments. Such protocols typically rely on pre-established secure cryptographic keys or public key infrastructure. Recently, Peyravian and Jeffries [M. Peyravian, C. Jeffries, Secure remote user access over insecure networks, Computer Communications 29 (5-6) (2006) 660-667] proposed a protocol for secure remote user access over insecure networks. Shortly after the protocol was published Shim [K.A. Shim, Security flaws of remote user access over insecure networks, Computer Communications 30 (1) (2006) 117-121] and Munilla et al. [J. Munilla, A. Peinado, Off-line password-guessing attack to Peyravian-Jeffries's remote user authentication protocol, Computer Communications 30 (1) (2006) 52-54] independently presented an off-line guessing attack on the protocol. Based on their findings we present an improved secure password-based protocol for remote user authentication, password change, and session key establishment over insecure networks, which is immune against the attack. (C) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:1945 / 1951
页数:7
相关论文
共 50 条
  • [31] A lightweight authentication and key agreement protocol preserving user anonymity
    Nikooghadam, Morteza
    Jahantigh, Reza
    Arshad, Hamed
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (11) : 13401 - 13423
  • [32] A lightweight authentication and key agreement protocol preserving user anonymity
    Morteza Nikooghadam
    Reza Jahantigh
    Hamed Arshad
    Multimedia Tools and Applications, 2017, 76 : 13401 - 13423
  • [33] Password-Based Authentication Protocol for Secret-Sharing-Based Multiparty Computation
    Kikuchi, Ryo
    Chida, Koji
    Ikarashi, Dai
    Hamada, Koki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01) : 51 - 63
  • [34] Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation
    Kikuchi, Ryo
    Chida, Koji
    Ikarashi, Dai
    Hamada, Koki
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 179 - 196
  • [35] Dynamic Password Authentication Protocol Using Android Device and One-Way Function
    Bhola, Geetanjali
    Kaur, Divjot
    Raj, Mahesh
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 1863 - 1866
  • [36] A new simple authenticated key agreement and protected password change protocol
    Yoon, EJ
    Yoo, KY
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 955 - 964
  • [37] An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks
    Amin, Ruhul
    Islam, S. K. Hafizul
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 104 : 133 - 144
  • [38] A lightweight password-based authentication protocol using smart card
    Wang, Chenyu
    Wang, Ding
    Xu, Guoai
    Guo, Yanhui
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (16)
  • [39] Privacy Preserving Biometric-based User Authentication Protocol using Smart Cards
    Park, Minsu
    Kim, Hyunsung
    Lee, Sung-Woon
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1541 - 1544
  • [40] An improvement on Yang et al.'s password authentication schemes
    Kim, KW
    Jeon, JC
    Yoo, KY
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (01) : 207 - 215