Improvement of the Peyravian-Jeffries's user authentication protocol and password change protocol

被引:7
|
作者
Hoelbl, Marko [1 ]
Welzer, Tatjana [1 ]
Brumen, Bostjan [1 ]
机构
[1] Univ Maribor, Fac Elect Engn & Comp Sci, SLO-2000 Maribor, Slovenia
关键词
authentication; hash; off-line password guessing attack; password; security;
D O I
10.1016/j.comcom.2007.12.029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Remote authentication of users supported by passwords is a broadly adopted method of authentication within insecure network environments. Such protocols typically rely on pre-established secure cryptographic keys or public key infrastructure. Recently, Peyravian and Jeffries [M. Peyravian, C. Jeffries, Secure remote user access over insecure networks, Computer Communications 29 (5-6) (2006) 660-667] proposed a protocol for secure remote user access over insecure networks. Shortly after the protocol was published Shim [K.A. Shim, Security flaws of remote user access over insecure networks, Computer Communications 30 (1) (2006) 117-121] and Munilla et al. [J. Munilla, A. Peinado, Off-line password-guessing attack to Peyravian-Jeffries's remote user authentication protocol, Computer Communications 30 (1) (2006) 52-54] independently presented an off-line guessing attack on the protocol. Based on their findings we present an improved secure password-based protocol for remote user authentication, password change, and session key establishment over insecure networks, which is immune against the attack. (C) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:1945 / 1951
页数:7
相关论文
共 50 条
  • [41] The Vulnerability Analysis and Improvement of the TETRA Authentication Protocol
    Park, Yong-Seok
    Kim, Choon-Soo
    Ryou, Jae-Cheol
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 1469 - 1473
  • [42] Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks
    He, Debiao
    Zhang, Yuanyuan
    Chen, Jianhua
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 74 (02) : 229 - 243
  • [43] Further improvement of an efficient password based remote user authentication scheme using smart cards
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 612 - 614
  • [44] An Efficient Remote User Password Authentication Scheme based on Rabin's Cryptosystem
    Ranjan, Pratik
    Om, Hari
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (01) : 217 - 244
  • [45] An Efficient Remote User Password Authentication Scheme based on Rabin’s Cryptosystem
    Pratik Ranjan
    Hari Om
    Wireless Personal Communications, 2016, 90 : 217 - 244
  • [46] Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
    Gunasinghe, Hasini
    Bertino, Elisa
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 389 - 408
  • [47] A multi-factor user authentication protocol for the internet of drones environment
    Sousa, Manuela de Jesus
    Gondim, Paulo Roberto L.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2025, 18 (02)
  • [48] Off-line password-guessing attacks on the generalized key agreement and password authentication protocol
    Shim, K
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 511 - 515
  • [49] Cryptanalysis and improvement of a biometric-based remote user authentication protocol usable in a multiserver environment
    Chandrakar, Preeti
    Om, Hari
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2017, 28 (12):
  • [50] Certificateless Anonymous User Authentication Protocol for Cloud Computing
    Zhang, Manjun
    Zhang, Yan
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA AND SMART CITY (ICITBS), 2016, : 200 - 203