[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/648046.745372guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Security and efficiency in authentication protocols resistant to password guessing attack

Published: 02 November 1997 Publication History

Abstract

Cryptographic protocols for authentication and key exchange are necessary for secure communications. Most protocols have assumed that a strong secret for authentication should be shared between communicating participants in the light of a threat of dictionary attacks. But a user-chosen weak secret, i.e. password, is typically used for authentication. Since most users want to use an easily memorizable password, which tends to be easy to guess, several authentication protocols that protect such a weak secret from password guessing attacks, have been developed. However, those security-oriented protocols are more expensive in terms of the number of random numbers, cipher operations, and protocol steps than the previous protocols which are not resistant to guessing attacks. The authors propose new authentication and key exchange protocols, which are efficient considerably in protecting a poorly-chosen weak secret from guessing attacks.

Cited By

View all
  • (2015)Security Improvement of Portable Key Management Using a Mobile PhoneProceedings, Part IV, of the 15th International Conference on Computational Science and Its Applications -- ICCSA 2015 - Volume 915810.1007/978-3-319-21410-8_12(148-159)Online publication date: 22-Jun-2015

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
LCN '97: Proceedings of the 22nd Annual IEEE Conference on Local Computer Networks
November 1997
545 pages
ISBN:0818681411

Publisher

IEEE Computer Society

United States

Publication History

Published: 02 November 1997

Author Tags

  1. authentication protocols
  2. cipher operations
  3. cryptographic protocols
  4. dictionary attacks
  5. efficiency
  6. key exchange
  7. message authentication
  8. password guessing attack resistance
  9. poorly-chosen weak secret protection
  10. protocol steps
  11. random numbers
  12. secret
  13. secure communications
  14. security
  15. security-oriented protocols
  16. user-chosen weak secret

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2015)Security Improvement of Portable Key Management Using a Mobile PhoneProceedings, Part IV, of the 15th International Conference on Computational Science and Its Applications -- ICCSA 2015 - Volume 915810.1007/978-3-319-21410-8_12(148-159)Online publication date: 22-Jun-2015

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media