期刊文献+

一种新的改进口令认证协议 被引量:2

A New Improved Password Authentication Protocol
下载PDF
导出
摘要 口令认证作为一种简单易用的认证方式,被广泛应用于各种认证场合。最近几年,很多口令认证协议被提出来。2004年Kim和Choi提出一种经典的PAP口令认证协议,这种协议被引入802.11标准之中。随后这种协议被证明不能够抵抗离线字典攻击和重放攻击。2006年Ma等人提出这种协议的改进,随后Yoon等人证明Ma等人提出的协议仍然不能够抵抗离线字典攻击,并提出了改进。对Yoon等人提出的协议进行了分析,指出Yoon等人提出的协议仍然不能够抵抗离线字典攻击,提出了攻击模式。并对Yoon等人提出的协议进行了改进,提出一种T-PAP协议,能够抵抗离线字典和重放攻击。 Password authentication has been widely applied in various certification occasions because it is easy-to-use.In recent years,a lot of password authentication protocols have been proposed.In 2004,Kim and Choi proposed a classic PAP password authentication protocol which has been introduced into the 802.11.Subsequently this protocol was proved that can’t resist offline dictionary attacks and replay attacks.In 2006,Ma et al proposed an improvement protocol of this agreement.And Yoon et al proved that the agreement proposed by Ma et al are still not able to resist offline dictionary attacks,and propose an improved protocol.In this paper we analysis the protocol proposed by Yoon et al and pointed out that the protocol still can’t resist offline dictionary attack,and propose an attack mode.We proposed a T-PAP protocol which can resist offline dictionary and replay attacks.
出处 《计算机安全》 2012年第6期10-13,共4页 Network & Computer Security
关键词 口令 认证 信息安全 password; authentication; information security;
  • 相关文献

参考文献8

  • 1LAN MAN St&nd&rds Committee of the IEEE Computer Society, Wireless LAN Medium Access Control (MAC) &nd Physic&l L&yer (PHY) Specific&tions, ANS/IEEE St&ndard 802.1], June 2005.
  • 2J.R.Walker. Unsafe at any key size; An analysis of the WEP encapsulation, Technical Report 03628E, IEEE 802.11 Committee, 2000.
  • 3J. H&ssell. P, ADIUS, 0 ' Peilly , 2002 .
  • 4I.G. Kim and J .Y .Choi. Formal verification of PAP and EAPMD5 protocols in wireless networks: FDR model checking Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004),Fukuoka, Japan, pp.264-269, March 2004,.
  • 5G .Lowe Casper : a compiler for the analysis of secur)ty protocols, The 10th IEEE Computer Security Foundations Workshop, pp.18-30, 1997.
  • 6P.Y.A. Ryan and S.A. Schneider, Modeling &nd &nalysis of security protocols: the CSP appro&ch. Addison-Wesley, 2001.
  • 7E.J Yoon, K.Y Yoo, in Wireless Net-works, on PP Secure Password Authentication Protoco The 2006 International Conference Next Gener&tion Web Services Pr&ctices NWeSP'06) 49-154, 2006.
  • 8Y.-C. Lee, Y.-C. Hsieh, P.--S. You, A New Improved Secure P&ssword Authentic&tion Protocol to P, esist Guessing Att&cK in Wireless NetworKs. 7th WSEAS Int.Conf. on APPLIED COMPUTER&APPLIED COMPUTATIONAL SCIENCE (ACACOS 108), H&ngzhou, Chin&, April 6-8, 2008 160-163.

同被引文献12

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部