Affiliation:
1. National Chung Cheng University, Taiwan
Abstract
Password authentication protocols are divided into two types. One employs the easy-to-remember password while the other requires the strong password. In 2001, Lin et al. proposed an optimal strong-password authentication protocol (OSPA) to resist the replay attack and the denial-of-service attack. However, Chen and Ku pointed out that the OSPA protocol is vulnerable to the stolen-verifier attack. Hence, Lin et al. presented an enhancement in 2003. Nevertheless, mutual authentication is not ensured in Lin et al.'s protocol such that it suffers from the server spoofing attack. Moreover, Lin et al.'s protocol is also vulnerable to the denial-of-service attack. As a result, we present a secure strong-password authentication protocol in this paper to overcome their disadvantages.
Publisher
Association for Computing Machinery (ACM)
Reference19 articles.
1. Augmented encrypted key exchange
2. Provably Secure Password Authentication Key Exchange Using Diffie-Hellman;Boyko V.;Proceedings of EuroCrypt,2000
3. Stolen-verifier Attack on Two New Strong-password Authentication Protocol;Chen C. M.;IEICE Transactions on Communications,2002
4. Undetectable on-line password guessing attacks
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献