Offline Password Guessing Attacks on Smart-Card-Based Remote User Authentication Schemes

被引:2
作者
Li, Xue-lei [1 ]
Wen, Qiao-yan [1 ]
Zhang, Hua [1 ]
Jin, Zheng-ping [1 ]
Li, Wen-min [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
来源
PROCEEDINGS OF THE 6TH INTERNATIONAL ASIA CONFERENCE ON INDUSTRIAL ENGINEERING AND MANAGEMENT INNOVATION, VOL 2: INNOVATION AND PRACTICE OF INDUSTRIAL ENGINEERING AND MANAGMENT | 2016年
关键词
Authentication; Password; Security; Smart card; IMPROVEMENT; SECURITY;
D O I
10.2991/978-94-6239-145-1_9
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Password as an easy-to-remember credential plays an important role in remote user authentication schemes, while drawing from a space so small that an adversary may exhaustively search all possible candidate passwords to guess the correct one. In order to enhance the security of the password authentication scheme, smart card is introduced as the second factor to construct two-factor authentication scheme. However, we find out that two latest smart-card-based password authentication schemes are vulnerable to offline password guessing attacks under the definition of secure two-factor authentication. Furthermore, in order to show the serious consequence of offline password guessing attacks, we illustrate that the password compromise impersonation attacks as further threats are effective to break down the authentication schemes. Finally, we conclude the reasons why these weaknesses exist and present our improved ideas to avoid these problems in the future.
引用
收藏
页码:81 / 89
页数:9
相关论文
共 26 条
[1]   Robust smart-card-based remote user password authentication scheme [J].
Chen, Bae-Ling ;
Kuo, Wen-Chung ;
Wuu, Lih-Chyau .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (02) :377-389
[2]   An efficient and practical solution to remote authentication: Smart card [J].
Chien, HY ;
Jan, JK ;
Tseng, YM .
COMPUTERS & SECURITY, 2002, 21 (04) :372-375
[3]  
Ding Wang, 2012, Information Computing and Applications. Proceedings of the Third International Conference, ICICA 2012, P181, DOI 10.1007/978-3-642-34062-8_24
[4]  
Halevi S., 1999, ACM Trans. Inf. Syst. Secur, V2, P230
[5]  
He D., 2011, CRYPTOLOGY EPRINT AR
[6]  
Hsu CL, 2004, COMP STAND INTER, V26, P167, DOI [10.1016/S0920-5489(03)00094-1, 10.1016/s0920-5489(03)00094-1]
[7]   A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems [J].
Huang, Xinyi ;
Xiang, Yang ;
Chonka, Ashley ;
Zhou, Jianying ;
Deng, Robert H. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (08) :1390-1397
[8]  
Hwang JJ, 2002, IEICE T COMMUN, VE85B, P823
[9]   A new remote user authentication scheme using smart cards [J].
Hwang, MS ;
Li, LH .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) :28-30
[10]   Design of improved password authentication and update scheme based on elliptic curve cryptography [J].
Islam, S. K. Hafizul ;
Biswas, G. P. .
MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (11-12) :2703-2717