期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
AN IMPROVED REMOTE PASSWORD AUTHENTICATION SCHEME WITH SMART CARD
1
作者 Jing Chao 《Journal of Electronics(China)》 2012年第6期550-555,共6页
This paper analyzes the security performance of a latest proposed remote two-factor user authentication scheme and proposes an improved scheme based on the dynamic ID to avoid the attacks it suffers. Besides this, in ... This paper analyzes the security performance of a latest proposed remote two-factor user authentication scheme and proposes an improved scheme based on the dynamic ID to avoid the attacks it suffers. Besides this, in our proposed scheme the password is no longer involved in the calculation of verification phase which makes our scheme more secure and costs less than the old one. At last we analyze the performance of our proposed scheme to prove it provides mutual authentication between the user and the server. Moreover, it also resists password guessing attack, server and user masquerade attack and replay attack effectively. 展开更多
关键词 Two-factor password authentication Smart card Dynamic ID
下载PDF
A New Secure Password Authentication Scheme Using Smart Cards
2
作者 WANG Bangju1,2, WANG Yuhua3, ZHANG Huanguo1 1. School of Computer, Wuhan University/Key Laboratory of Aerospace Information Security and Trust Computing of Ministry of Education, Wuhan 430072, Hubei, China 2. School of Science, Huazhong Agricultural University, Wuhan 430070, Hubei, China +1 位作者 3. College of Information Science and Engineering, Henan University of Technology Zhengzhou 450001, Henan, China 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期739-743,共5页
Thirteen security requirements for an ideal password authentication scheme using smart cards are listed and a new smart card based password authentication scheme with identity anonymity is proposed. The new scheme can... Thirteen security requirements for an ideal password authentication scheme using smart cards are listed and a new smart card based password authentication scheme with identity anonymity is proposed. The new scheme can satisfy all the listed ideal security requirements and has the following merits: (1) it can resist all the attacks listed in introduction; (2) less storage memory requirement due to no verification table stored in server; (3) low computational cost due to hash functions based operations; (4) even if the smart card is lost, the new system is still secure; (5) As user identity is anonymous, this scheme is more practical. The new proposed scheme can be applied in source constraint networks. 展开更多
关键词 password password authentication hash function ATTACK smart card
原文传递
Web Application Authentication Using Visual Cryptography and Cued Clicked Point Recall-based Graphical Password
3
作者 Mary Ogbuka Kenneth Stephen Michael Olujuwon 《Journal of Computer Science Research》 2021年第3期29-41,共13页
Alphanumerical usernames and passwords are the most used computer authentication technique.This approach has been found to have a number of disadvantages.Users,for example,frequently choose passwords that are simple t... Alphanumerical usernames and passwords are the most used computer authentication technique.This approach has been found to have a number of disadvantages.Users,for example,frequently choose passwords that are simple to guess.On the other side,if a password is difficult to guess,it is also difficult to remember.Graphical passwords have been proposed in the literature as a potential alternative to alphanumerical passwords,based on the fact that people remember pictures better than text.Existing graphical passwords,on the other hand,are vulnerable to a shoulder surfing assault.To address this shoulder surfing vulnerability,this study proposes an authentication system for web-applications based on visual cryptography and cued click point recall-based graphical password.The efficiency of the proposed system was validated using unit,system and usability testing measures.The results of the system and unit testing showed that the proposed system accomplished its objectives and requirements.The results of the usability test showed that the proposed system is easy to use,friendly and highly secured. 展开更多
关键词 password authentication Graphical password Text password Visual cryptography Shoulder surfing Key-logging
下载PDF
Design and Implementation of USB Key System Based on Dual-Factor Identity Authentication Protocol
4
作者 Jianxin Wang Zifan Xu +2 位作者 Xiangze Chang Chaoen Xiao Lei Zhang 《Journal of Electronic Research and Application》 2024年第5期161-167,共7页
With the increasing demand for information security,traditional single-factor authentication technology can no longer meet security requirements.To this end,this paper proposes a Universal Serial Bus(USB)Key hardware ... With the increasing demand for information security,traditional single-factor authentication technology can no longer meet security requirements.To this end,this paper proposes a Universal Serial Bus(USB)Key hardware and software system based on a two-factor authentication protocol,aiming to improve the security and reliability of authentication.This paper first analyzes the current status and technical principles of USB Key-related research domestically and internationally and designs a two-factor authentication protocol that combines impact/response authentication and static password authentication.The system consists of a host computer and a USB Key device.The host computer interacts with the USB Key through a graphical user interface.The Secure Hash Algorithm 1(SHA-1)and MySQL database are used to implement the authentication function.Experimental results show that the designed two-factor authentication protocol can effectively prevent replay attacks and information tampering,and improve the security of authentication.If the corresponding USB Key is not inserted,the system will prompt that the device is not found.Once the USB Key is inserted,user identity is confirmed through two-factor verification,which includes impact/response authentication and static password authentication. 展开更多
关键词 Information security USB Key Impact/response authentication Static password authentication
下载PDF
NEW REMOTE USER AUTHENTICATION SCHEME USING SMART CARD 被引量:2
5
作者 杨君佐 王永建 周渊 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2012年第2期187-192,共6页
Because the modified remote user authentication scheme proposed by Shen, Lin and Hwang is insecure, the Shen-Lin-Hwang' s scheme is improved and a new secure remote user authentication scheme based on the bi- linear ... Because the modified remote user authentication scheme proposed by Shen, Lin and Hwang is insecure, the Shen-Lin-Hwang' s scheme is improved and a new secure remote user authentication scheme based on the bi- linear parings is proposed. Moreover, the effectiveness of the new scheme is analyzed, and it is proved that the new scheme can prevent from all kinds of known attack. The one-way hash function is effective in the new scheme. The new scheme is proved that it has high effectiveness and fast convergence speed. Moreover, the ap- plication of the new scheme is easy and operational. 展开更多
关键词 remote user authentication password authentication remote login bilinear pairings
下载PDF
Research and Implementation of Time Synchronous Dynamic Password Based on SM3 Hash Algorithm
6
作者 Dognery Sinaly Silue Wanggen Wan Muhammad Rizwan 《Open Journal of Applied Sciences》 2016年第13期893-902,共10页
With the rapid development of information technology, demand of network & information security has increased. People enjoy many benefits by virtue of information technology. At the same time network security has b... With the rapid development of information technology, demand of network & information security has increased. People enjoy many benefits by virtue of information technology. At the same time network security has become the important challenge, but network information security has become a top priority. In the field of authentication, dynamic password technology has gained users’ trust and favor because of its safety and ease of operation. Dynamic password, SHA (Secure Hash Algorithm) is widely used globally and acts as information security mechanism against potential threat. The cryptographic algorithm is an open research area, and development of these state-owned technology products helps secure encryption product and provides safeguard against threats. Dynamic password authentication technology is based on time synchronization, using the state-owned password algorithm. SM3 hash algorithm can meet the security needs of a variety of cryptographic applications for commercial cryptographic applications and verification of digital signatures, generation and verification of message authentication code. Dynamic password basically generates an unpredictable random numbers based on a combination of specialized algorithms. Each password can only be used once, and help provide high safety. Therefore, the dynamic password technology for network information security issues is of great significance. In our proposed algorithm, dynamic password is generated by SM3 Hash Algorithm using current time and the identity ID and it varies with time and changes randomly. Coupled with the SM3 hash algorithm security, dynamic password security properties can be further improved, thus it effectively improves network authentication security. 展开更多
关键词 Dynamic password authentication SM3 Hash Algorithm Network authentication Security One Time password
下载PDF
An improved and secure multiserver authentication scheme based on biometrics and smartcard 被引量:3
7
作者 Ashish Kumar Hari Om 《Digital Communications and Networks》 SCIE 2018年第1期27-38,共12页
With the advancement in internet technologies, the number of servers has increased remarkably to provide more services to the end users. These services are provided over the public channels, which are insecure and sus... With the advancement in internet technologies, the number of servers has increased remarkably to provide more services to the end users. These services are provided over the public channels, which are insecure and susceptible to interception, modification, and deletion. To provide security, registered entities are authenticated and then a session key is established between them to communicate securely. The conventional schemes anow a user to access services only after their independent registration with each desired server in a multiserver system. Therefore, a user must possess multiple smartcards and memorize various identities and passwords for obtaining services from multiple servers. This has led to the adoption of multiserver authentication in which a user accesses services of multiple servers after registering himself at only one central authority. Recently, Kumar and Om discussed a scheme for multiserver environment by using smartcard. Since the user-memorized passwords are of low entropy, it is possible for an attacker to guess them. This paper uses biometric information of user to enhance the security of the scheme by Kumar and Ore. Moreover, we conducted rigorous security analyses (informal and formal) in this study to prove the security of the proposed scheme against all known attacks. We also simulated our scheme by using the automated tool, ProVerif, to prove its secrecy and authentication properties. A comparative study of the proposed scheme with the existing related schemes shows its effectiveness. 展开更多
关键词 Smartcard password Security authentication Multi-server Biometric ProVerif
下载PDF
Cryptanalysis of Two Pseudo-attacks from the Same Mathematic Mistake
8
作者 刘杰 施建俊 李建华 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第3期394-396,共3页
Yang and Shieh proposed a timestamp-hased password authentication scheme. Fan and Shen gave differ- ent improvements on it. Wang claimed that Fan's improvement is insecure and gave his attack. Yang did the simi- lar ... Yang and Shieh proposed a timestamp-hased password authentication scheme. Fan and Shen gave differ- ent improvements on it. Wang claimed that Fan's improvement is insecure and gave his attack. Yang did the simi- lar things on Shen's scheme. This paper gave further cryptanalysis on Wang's and Yang's attacks and pointed out that both of their attacks are infeasible. Wang and Yang made the same mathematic mistake and their attacks are pseudo. 展开更多
关键词 password authentication CRYPTANALYSIS number theory
下载PDF
Event-Oriented Dynamic Security Service for Demand Response in Smart Grid Employing Mobile Networks
9
作者 GUO Longhua DONG Mianxiong +2 位作者 Kaoru Ota WU Jun LI Jianhua 《China Communications》 SCIE CSCD 2015年第12期63-75,共13页
Equipped with millions of sensors and smart meters in smart gird,a reliable and resilient wireless communication technology is badly needed.Mobile networks are among the major energy communication networks which contr... Equipped with millions of sensors and smart meters in smart gird,a reliable and resilient wireless communication technology is badly needed.Mobile networks are among the major energy communication networks which contribute to global energy consumption increase rapidly.As one of core technologies of smart grid employing mobile networks,Demand Response(DR) helps improving efficiency,reliability and security for electric power grid infrastructure.Security of DR events is one of the most important issues in DR.However,the security requirements of different DR events are dynamic for variousactual demands.To address this,an event-oriented dynamic security service mechanism is proposed for DR.Three kinds of security services including security access service,security communication service and security analysis service for DR event are composited dynamically by the fine-grained sub services.An experiment prototype of the network of State Grid Corporation of China(SGCC) is established.Experiment and evaluations shows the feasibility and effectiveness of the proposed scheme in smart grid employing mobile network. 展开更多
关键词 dynamically smart overhead infrastructure broadcast badly password electricity prototype authentication
下载PDF
Simple and Efficient Password-Based Authenticated Key Exchange Protocol 被引量:1
10
作者 王立斌 潘嘉昕 马昌社 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第4期459-465,共7页
Password-based authenticated key exchange(PAKE) protocols are cryptographic primitives which enable two entities,who only share a memorable password,to identify each other and to communicate over a public unreliable n... Password-based authenticated key exchange(PAKE) protocols are cryptographic primitives which enable two entities,who only share a memorable password,to identify each other and to communicate over a public unreliable network with a secure session key.In this paper,we propose a simple,efficient and provably secure PAKE protocol based on Diffie-Hellman key exchange and cryptographic hash function.Our protocol is secure against dictionary attacks.Its security is proved based on the hardness of the computational Diffie-Hellman problem in the random oracle model. 展开更多
关键词 password authentication key exchange provable security
原文传递
A Generic Framework for Anonymous Authentication in Mobile Networks
11
作者 徐静 朱文涛 《Journal of Computer Science & Technology》 SCIE EI CSCD 2013年第4期732-742,共11页
Designing an anonymous user authentication scheme in global mobility networks is a non-trivial task because wireless networks are susceptible to attacks and mobile devices powered by batteries have limited communicati... Designing an anonymous user authentication scheme in global mobility networks is a non-trivial task because wireless networks are susceptible to attacks and mobile devices powered by batteries have limited communication, processing and storage capabilities. In this paper, we present ~ generic construction that converts any existing secure password authen- tication scheme based on a smart card into an anonymous authentication scheme for roaming services. The security proof of our construction can be derived from the underlying password authentication scheme employing the same assumptions. Compared with the original password authentication scheme, the transformed scheme does not sacrifice the authentication efficiency, and additionally, an agreed session key can be securely established between an anonymous mobile user and the foreign agent in charge of the network being visited. Furthermore, we present an instantiation of the proposed generic construction. The performance analysis shows that compared with other related anonymous authentication schemes, our instantiation is more efficient. 展开更多
关键词 wireless security roaming service user anonymity password authentication key agreement
原文传递
Simple Three-Party Password Authenticated Key Exchange Protocol 被引量:1
12
作者 罗乃维 叶国晖 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期600-603,共4页
Three-party password authenticated key exchange (3PAKE) protocol plays a significant role in the history of secure communication area in which two clients agree a robust session key in an authentic manner based on pas... Three-party password authenticated key exchange (3PAKE) protocol plays a significant role in the history of secure communication area in which two clients agree a robust session key in an authentic manner based on passwords. In recent years, researchers focused on developing simple 3PAKE (S-3PAKE) protocol to gain system e?ciency while preserving security robustness for the system. In this study, we first demonstrate how an undetectable on-line dictionary attack can be successfully applied over three existing S-3PAKE schemes. An error correction code (ECC) based S-3PAKE protocol is then introduced to eliminate the identified authentication weakness. 展开更多
关键词 authentication CRYPTANALYSIS error correction code (ECC) simple three-party password authenticated key exchange (S-3PAKE) security undetectable on-line dictionary attack
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部