期刊文献+

基于几何方法的远程登录认证方案的密码分析 被引量:2

Cryptanalysis of the remote login authentication scheme based on the geometric approach
下载PDF
导出
摘要 Wu提出的基于几何方法的程登录认证方案无法抵制假冒攻击.为此,Chien等人给出了一个改进方案,但这种改进方案存在安全缺陷,极易受到猜测攻击.一旦用户的口令被猜测到,攻击者就可利用该口令在任意时间成功地进行远程登录认证.为了克服这个缺陷,在智能卡中存储了一个随机数,从而得到一种新的改进方案.在新的改进方案中,攻击者无法离线检验所猜测的口令是否正确,因而可以避免猜测攻击. Wus remote login authentication scheme could not resist the impersonation attack. That scheme is based on simple geometric properties on the Euclidean plane. Chien proposed a modified scheme to improve Wus scheme. In this paper,a cyrptanalysis of Chiens scheme shows that the improved scheme is also vulnerable to the guessing attack. An attacker can obtain a users password by guessing, and then succeed in remote login authentication using this password. In our improved scheme, to overcome this disadvantage, a random number is selected and stored in a smart card. Therefore, it is impossible for an attacker to verify the guessed password offline.
作者 万涛 马建峰
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2003年第3期378-380,402,共4页 Journal of Xidian University
基金 国家自然科学基金重大计划资助项目(90204012) 国家863计划(2002AA143021) 2003年教育部科学技术研究重点项目 教育部优秀青年教师资助计划
关键词 远程登录 猜测攻击 口令认证 智能卡 几何方法 密码 remote login password authentication smart card guessing attack
  • 相关文献

参考文献6

  • 1Chang C C, Liao W Y. A Remote Password Authentication Scheme Based Upon ElGamal's Signature Scheme[ J]. Computer & Security,1994, 13(2): 137-144.
  • 2Chang C C, Wu T C. Remote Password Authentication With Smart Cards[J]. IEE Proc E, 1991, 138(3): 165-168.
  • 3Wu T C. Remote Login Authentication Scheme Based on a Geometric Approach[J]. Computer Communications, 1995, 18( 12): 959-963.
  • 4Hwang M S. Cryptanalysis of a Remote Login Authentication Scheme[J]. Computer Communications, 1999, 22(8): 742-744.
  • 5Chien H Y, Jan J K, Tseng Y M. A Modified Remote Login Authentication Scheme Based on Geometric Approach [ J]. Journal of Systems and Software, 2001, 55(3): 287-290.
  • 6Li G, Lomas M A, Needham R M, et al. Protecting Poorly Chosen Secrets from Guessing Attacks[J] . IEEE Journal on Selected Areas in Communications, 1993, 11(5) : 648-656.

同被引文献21

  • 1Wu Tzone-chen Remote Login Authentication Scheme Based on a Geometric Approach[J]. Computer Communications, 1995, 18(12): 959-963.
  • 2Wu Tzone-chen, He Weihua. A Geometric Approach for Sharing Secrets[J]. Computer & Security, 1995, 14(2): 135-145.
  • 3Hwang Min-shiang. Cryptanalysis of a Remote Login Authentication Scheme[J]. Computer Communications, 1999, 22(8): 742-744.
  • 4Chien Hung-yu, Jan Jinn-ke, Tseng Yuh-min. A Modified Remote Login Authentication Scheme Based on Geometric Approach[J]. Journal of Systems and Software, 2001, 55(3): 287-290.
  • 5Wang Shiuh-jeng. Yet Another Login Authentication Using N-dimensional Construction Based on Circle Property[J]. IEEE Trans. on Consumer Electronics, 2003, 49(2): 337-341.
  • 6Wang Shuhong, Bao Feng, Wang Jie. Comments on Yet Another Log-in Authentication Using N-dimensional Construction[J]. IEEE Transactions on Consumer Electronics, 2004, 50(2): 606-608.
  • 7Yang Fuw-yi, Jan Jinn-ke. Cryptanalysis of Log-in Authentication Based on Circle Property[J]. IEEE Transactions on Consumer Electronics, 2004, 50(2): 625-628.
  • 8Chor Leong-peng, Jing Hsu-wen, Chong Tan-peng. A Geometric Approach for Shared Secrets, a Refinement[J]. Computers & Security, 1998, 17(10): 725-732.
  • 9毛文波.现代密码学理论与实践[M].北京:电子工业出版社,2004:165-190.
  • 10FORD W, KALISKI JR B. Server-assisted generation of a strong secret from a password[C]//Proceedings of the 9th IEEE International Workshop Enabling Technologies. Los Alamitos, Cal., USA:IEEE Computer Society, 2000:176-180.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部