[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/794195.795036guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Optimal authentication protocols resistant to password guessing attacks

Published: 13 March 1995 Publication History

Abstract

Users are typically authenticated by their passwords. Because people are known to choose convenient passwords, which tend to be easy to guess, authentication protocols have been developed that protect user passwords from guessing attacks. These proposed protocols, however, use more messages and rounds than those protocols that are not resistant to guessing attacks. This paper gives new protocols that are resistant to guessing attacks and also optimal in both messages and rounds, thus refuting the previous belief that protection against guessing attacks makes an authentification protocol inherently more expensive.

Cited By

View all
  • (2016)Analyzing three-party authentication and key agreement protocol for real time IP multimedia server---client systemsMultimedia Tools and Applications10.1007/s11042-015-2542-475:10(5795-5817)Online publication date: 1-May-2016
  • (2011)Rethinking about guessing attacksProceedings of the 6th ACM Symposium on Information, Computer and Communications Security10.1145/1966913.1966954(316-325)Online publication date: 22-Mar-2011
  • (2010)Simple password-based three-party authenticated key exchange without server public keysInformation Sciences: an International Journal10.1016/j.ins.2010.01.005180:9(1702-1714)Online publication date: 1-May-2010
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
CSFW '95: Proceedings of the 8th IEEE workshop on Computer Security Foundations
March 1995
ISBN:0818670339

Publisher

IEEE Computer Society

United States

Publication History

Published: 13 March 1995

Author Tags

  1. message authentication
  2. optimal authentification protocols
  3. password guessing attacks
  4. protocols
  5. user passwords

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2016)Analyzing three-party authentication and key agreement protocol for real time IP multimedia server---client systemsMultimedia Tools and Applications10.1007/s11042-015-2542-475:10(5795-5817)Online publication date: 1-May-2016
  • (2011)Rethinking about guessing attacksProceedings of the 6th ACM Symposium on Information, Computer and Communications Security10.1145/1966913.1966954(316-325)Online publication date: 22-Mar-2011
  • (2010)Simple password-based three-party authenticated key exchange without server public keysInformation Sciences: an International Journal10.1016/j.ins.2010.01.005180:9(1702-1714)Online publication date: 1-May-2010
  • (2009)Efficient and secure authenticated key exchange using weak passwordsJournal of the ACM10.1145/1613676.161367957:1(1-39)Online publication date: 27-Nov-2009
  • (2009)Communication-efficient three-party protocols for authentication and key agreementComputers & Mathematics with Applications10.1016/j.camwa.2009.02.03958:4(641-648)Online publication date: 1-Aug-2009
  • (2008)Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle ModelProceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics10.1007/978-3-540-69304-8_8(69-76)Online publication date: 17-Jun-2008
  • (2007)Token-based authenticated key establishment protocols for three-party communicationProceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing10.5555/1780828.1780904(758-769)Online publication date: 17-Dec-2007
  • (2007)Spelling-error tolerant, order-independent pass-phrases via the damerau-levenshtein string-edit distance metricProceedings of the fifth Australasian symposium on ACSW frontiers - Volume 6810.5555/1274531.1274545(117-124)Online publication date: 30-Jan-2007
  • (2007)A review of information security issues and respective research contributionsACM SIGMIS Database: the DATABASE for Advances in Information Systems10.1145/1216218.121622438:1(60-80)Online publication date: 28-Feb-2007
  • (2007)Practical Password-Based Authenticated Key Exchange ProtocolComputational Intelligence and Security10.1007/978-3-540-74377-4_55(523-533)Online publication date: 1-Apr-2007
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media