Attacks on Human Identification Schemes

碩士 === 國立成功大學 === 資訊及電子工程研究所 === 83 === The security of a system often depends on identifying correctly the person at a terminal. There are many authentication mechanisms which support the security problem for computer systems...

Full description

Bibliographic Details
Main Authors: Peng ,Maujy, 彭懋芝
Other Authors: Tzonelih Hwang
Format: Others
Language:zh-TW
Published: 1995
Online Access:http://ndltd.ncl.edu.tw/handle/54659590209837200105
id ndltd-TW-083NCKU0393027
record_format oai_dc
spelling ndltd-TW-083NCKU03930272015-10-13T12:53:36Z http://ndltd.ncl.edu.tw/handle/54659590209837200105 Attacks on Human Identification Schemes 多種人性化身份驗證破解法 Peng ,Maujy 彭懋芝 碩士 國立成功大學 資訊及電子工程研究所 83 The security of a system often depends on identifying correctly the person at a terminal. There are many authentication mechanisms which support the security problem for computer systems. Among them, password authentication schemes are the most popular and inexpensive mechanisms used in many systems. In password authentication scheme, each user owns his/her identity and password. When he/she wants to login the computer system, he/she keys in his/her identity and password by himself/herself. This method, however, suffers both the peeping attacks where an intruder stands behind the login user to peep the typed password and the replay attacks where the intruder intercepts the password from the network and then impersonates the same user by replaying the intercepted password. A challenge-response type human identification scheme, withstands both the peeping and replay attacks, was proposed by Matsumoto and Imai in 1991. Each user and the host are assumed to share a common key. Knowing the common key shared with the user, the host can decide whether an answer replied from the user is correct or not. In their scheme, what the user has to do are simply to memorize a short secret and perform very simple operation based on the secret. In this thesis, three types of attacks, referred to here as the chosen challenge attack, the chosen response attack and the chosen challenge-response attack, on the human identification schemes are proposed. By these attacks, a malicious user first impersonates the host to send a forged challenge to the login user or impersonates the login user to send a modify response to the host, and then performs the intercepting or peeping attack to reveal the login user's secret password. Tzonelih Hwang 黃宗立 1995 學位論文 ; thesis 42 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立成功大學 === 資訊及電子工程研究所 === 83 === The security of a system often depends on identifying correctly the person at a terminal. There are many authentication mechanisms which support the security problem for computer systems. Among them, password authentication schemes are the most popular and inexpensive mechanisms used in many systems. In password authentication scheme, each user owns his/her identity and password. When he/she wants to login the computer system, he/she keys in his/her identity and password by himself/herself. This method, however, suffers both the peeping attacks where an intruder stands behind the login user to peep the typed password and the replay attacks where the intruder intercepts the password from the network and then impersonates the same user by replaying the intercepted password. A challenge-response type human identification scheme, withstands both the peeping and replay attacks, was proposed by Matsumoto and Imai in 1991. Each user and the host are assumed to share a common key. Knowing the common key shared with the user, the host can decide whether an answer replied from the user is correct or not. In their scheme, what the user has to do are simply to memorize a short secret and perform very simple operation based on the secret. In this thesis, three types of attacks, referred to here as the chosen challenge attack, the chosen response attack and the chosen challenge-response attack, on the human identification schemes are proposed. By these attacks, a malicious user first impersonates the host to send a forged challenge to the login user or impersonates the login user to send a modify response to the host, and then performs the intercepting or peeping attack to reveal the login user's secret password.
author2 Tzonelih Hwang
author_facet Tzonelih Hwang
Peng ,Maujy
彭懋芝
author Peng ,Maujy
彭懋芝
spellingShingle Peng ,Maujy
彭懋芝
Attacks on Human Identification Schemes
author_sort Peng ,Maujy
title Attacks on Human Identification Schemes
title_short Attacks on Human Identification Schemes
title_full Attacks on Human Identification Schemes
title_fullStr Attacks on Human Identification Schemes
title_full_unstemmed Attacks on Human Identification Schemes
title_sort attacks on human identification schemes
publishDate 1995
url http://ndltd.ncl.edu.tw/handle/54659590209837200105
work_keys_str_mv AT pengmaujy attacksonhumanidentificationschemes
AT péngmàozhī attacksonhumanidentificationschemes
AT pengmaujy duōzhǒngrénxìnghuàshēnfènyànzhèngpòjiěfǎ
AT péngmàozhī duōzhǒngrénxìnghuàshēnfènyànzhèngpòjiěfǎ
_version_ 1716868313291685888