User authentication protocol based on human memorable password and using RSA

被引:0
|
作者
Park, I [1 ]
Park, S
Oh, B
机构
[1] Mokpo Natl Univ, Dept Informat Secur, Jeonnam, South Korea
[2] Chodang Univ, Dept Comp Sci, Jeonnam, South Korea
来源
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4 | 2004年 / 3046卷
关键词
authentication; cryptography; password authentication; password dictionary; public key cryptography;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Until now, authentication protocol using the suggested password is not safe from off-line dictionary attack or password file compromise. On this paper, we define scheme password based authentication protocol (PAP) authentication protocol using password. PAP features managing one value choosing optionally of expressing password of many values. It presents PAP based authentication protocol, PAPRSA using RSA to manage values expressing password. PAPRSA is safe from attack involving off-line dictionary attack, password file compromise and excellent in efficient ways involving pass number, calculation amount.
引用
收藏
页码:698 / 707
页数:10
相关论文
共 50 条
  • [41] An Efficient Remote User Password Authentication Scheme based on Rabin's Cryptosystem
    Ranjan, Pratik
    Om, Hari
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (01) : 217 - 244
  • [42] An Efficient Remote User Password Authentication Scheme based on Rabin’s Cryptosystem
    Pratik Ranjan
    Hari Om
    Wireless Personal Communications, 2016, 90 : 217 - 244
  • [43] User Authentication Based on the Chess Graphical Password Scheme Resistant to Shoulder Surfing
    Yakovlev, V. A.
    Arkhipov, V. V.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2015, 49 (08) : 803 - 812
  • [44] A Password-Based User Authentication Scheme for the Integrated EPR Information System
    Zhen-Yu Wu
    Yufang Chung
    Feipei Lai
    Tzer-Shyong Chen
    Journal of Medical Systems, 2012, 36 : 631 - 638
  • [45] A Password-Based User Authentication Scheme for the Integrated EPR Information System
    Wu, Zhen-Yu
    Chung, Yufang
    Lai, Feipei
    Chen, Tzer-Shyong
    JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (02) : 631 - 638
  • [46] How to Preserve User Anonymity in Password-Based Anonymous Authentication Scheme
    Shin, SeongHan
    Kobara, Kazukuni
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (03): : 803 - 807
  • [47] User Define Time Based Change Pattern Dynamic Password Authentication Scheme
    Yusuf, Salisu Ibrahim
    Boukar, Moussa Mahamat
    Muhammad, Aminu Mukhtar
    Yusuf, Ahmed Dalhatu
    2018 14TH INTERNATIONAL CONFERENCE ON ELECTRONICS COMPUTER AND COMPUTATION (ICECCO), 2018,
  • [48] A Proxy User Authentication Protocol Using Source-Based Image Morphing
    Mao, Qian
    Bharanitharan, K.
    Chang, Chin-Chen
    COMPUTER JOURNAL, 2015, 58 (07): : 1573 - 1584
  • [49] An impersonation attack on one-time password authentication protocol OSPA
    Tsuji, T
    Shimizu, A
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2003, E86B (07) : 2182 - 2185
  • [50] Password-Based Authentication Protocol for Secret-Sharing-Based Multiparty Computation
    Kikuchi, Ryo
    Chida, Koji
    Ikarashi, Dai
    Hamada, Koki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01) : 51 - 63