A new strong-password authentication scheme using one-way hash functions

被引:28
作者
Lin, C. -W. [1 ]
Tsai, C. -S. [1 ]
Hwang, M. -S. [1 ]
机构
[1] Chaoyang Univ Technol, Dept Informat Management, Chaoyang, Taiwan
关键词
Smart Card; System Science International; Authentication Scheme; Replay Attack; Impersonation Attack;
D O I
10.1134/S1064230706040137
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, Sandirigama et al. have proposed an authentication scheme by the name of SAS and have claimed that it has the lowest storage, processing, and transmission overhead. In 2001, Lin et al. showed that the protocol is insecure and proposed an optimal strong-password authentication protocol called the OSPA protocol. However, Chen and Ku pointed out that both SAS and OSPA are vulnerable to stolen-verifier attack in 2002. Later, Lin, Shen, and Hwang proposed a modified OSPA protocol to repair the security law of OSPA protocol. In this paper, we propose a new strong-password authentication protocol that not only can withstand many possible attacks including a stolen-verifier attack, but that is also more efficient than the modified OSPA protocol.
引用
收藏
页码:623 / 626
页数:4
相关论文
共 13 条
[1]  
CHEIN HY, 2001, SYSTEMS SOFTWARE, V55
[2]  
CHEN CM, 2002, IEIECE T COMMUNICA B, V85
[3]  
CHIKWONG C, 2002, COMPUTERS SECURITY, V21
[4]  
HWANG MS, 2001, INT INFORM, V12
[5]  
HWANG MS, 1999, INT COMPUTER MATH, V70
[6]  
LEE CC, 2002, ACM OPERATING SYSTEM, V36
[7]  
LI LH, 2001, IEEE T NEURAL NETWOR, V12
[8]  
LIN CL, 2001, IEIECE T COMMUNICA B, V84
[9]  
LIN CW, 2003, ACM OPERATING SYSTEM, V37
[10]  
SANDIRIGAMA M, 2000, IEICE T COMMUNICAT B, V83