期刊文献+

基于口令与智能卡的可证安全认证密钥协商协议

Provably secure password authentication and key exchange protocol using smart card
下载PDF
导出
摘要 针对Lee-Yang-Won提出的双因子认证协议,发现原协议存在离线字典攻击,用户假冒攻击且缺少密钥协商,因此对原协议进行了改进,并在形式化模型下证明了新协议的安全性.证明结果显示,新协议克服了原协议存在的安全漏洞,保留了原方案的安全特性. The authors find the password authentication protocol using smart card proposed by Lee et al. suffers from off-line dictionary attack, user impersonation attack and lacks of key exchange. To solve these problems, an improved scheme is put forward and the security of the novel protocol is proved using the formal security model. The result shows that the novel protocol can not only conquer the security problem of the original protocol but also retain all security characteristics of the original protocol.
出处 《江苏科技大学学报(自然科学版)》 CAS 2012年第3期282-287,共6页 Journal of Jiangsu University of Science and Technology:Natural Science Edition
基金 江苏省2011年度普通高校研究生科研创新计划基金资助项目(CXZZ11_0295) 信息安全国家重点实验室开放基金资助项目
关键词 离线字典攻击 用户假冒攻击 双因子安全 双向认证 off-line dictionary attack user impersonation attack two-factor security mutual authentication
  • 相关文献

参考文献11

  • 1Li C T, Chu Y P. Cryptanalysis of threshold password authentication against guessing attacks in ad hoc networks [J]. International Journal of Network Security, 2009,8 (2): 8-166.
  • 2Li C T. An enhanced remote user authentication scheme providing mutual authentication and key agreement with smart cards[C]//Proceedings of 5th International conference on Information Assurance and Security. [s. l.] : IEEE CS, 2009 : 20 - 517.
  • 3Song R. Advanced smart card based password authentication protocol [J]. Computer Standards & Interfaces, 2010,32(4):321 -325.
  • 4Kocher P, Jaffe J, Jun B. Differential power analysis [ C ]//CRYPTO 1999. Germany : Springer-Verlag, 1999 : 388 - 397.
  • 5Messerges T S, Dabbish E A, Sloan R H. Examining smart card security under the threat of power analysis attacks[J]. IEEE Transaction on Computers ,2002,51 ( 5 ): 541 - 552.
  • 6Tian X, Zhu R W, Wong R W. Improved Efficient Remote User Authentication Schemes [ J ]. International Journal of Network Security, 2007,4 ( 2 ) : 149 - 154.
  • 7Wu S T, Chieu B. A user friendly remote authentication scheme with smart cards [J]. Computer & Security, 2003, 22(6) :547 -550.
  • 8Lee N Y I Chiu Y C. Improved remote authentication scheme with smart card [J]. Computer Standards & Interfaces ,2005,27 : 177 - 180.
  • 9Lee Y S, Yang H K, Won D H. Attacking and improving on Lee and Chiu's authentication scheme using smart cards[ C ] //ISPEC 2010. Heidelberg: Springer, 2010: 377 - 385.
  • 10Xu J, Zhu W T, Feng D G. An improved smart card based password authentication scheme with provable security [ J ]. Computer Standards & Interfaces, 2009,31 : 723 - 728.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部