Attacks on Human Identification Schemes
碩士 === 國立成功大學 === 資訊及電子工程研究所 === 83 === The security of a system often depends on identifying correctly the person at a terminal. There are many authentication mechanisms which support the security problem for computer systems...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
1995
|
Online Access: | http://ndltd.ncl.edu.tw/handle/54659590209837200105 |
id |
ndltd-TW-083NCKU0393027 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-083NCKU03930272015-10-13T12:53:36Z http://ndltd.ncl.edu.tw/handle/54659590209837200105 Attacks on Human Identification Schemes 多種人性化身份驗證破解法 Peng ,Maujy 彭懋芝 碩士 國立成功大學 資訊及電子工程研究所 83 The security of a system often depends on identifying correctly the person at a terminal. There are many authentication mechanisms which support the security problem for computer systems. Among them, password authentication schemes are the most popular and inexpensive mechanisms used in many systems. In password authentication scheme, each user owns his/her identity and password. When he/she wants to login the computer system, he/she keys in his/her identity and password by himself/herself. This method, however, suffers both the peeping attacks where an intruder stands behind the login user to peep the typed password and the replay attacks where the intruder intercepts the password from the network and then impersonates the same user by replaying the intercepted password. A challenge-response type human identification scheme, withstands both the peeping and replay attacks, was proposed by Matsumoto and Imai in 1991. Each user and the host are assumed to share a common key. Knowing the common key shared with the user, the host can decide whether an answer replied from the user is correct or not. In their scheme, what the user has to do are simply to memorize a short secret and perform very simple operation based on the secret. In this thesis, three types of attacks, referred to here as the chosen challenge attack, the chosen response attack and the chosen challenge-response attack, on the human identification schemes are proposed. By these attacks, a malicious user first impersonates the host to send a forged challenge to the login user or impersonates the login user to send a modify response to the host, and then performs the intercepting or peeping attack to reveal the login user's secret password. Tzonelih Hwang 黃宗立 1995 學位論文 ; thesis 42 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立成功大學 === 資訊及電子工程研究所 === 83 === The security of a system often depends on identifying
correctly the person at a terminal. There are many
authentication mechanisms which support the security problem
for computer systems. Among them, password authentication
schemes are the most popular and inexpensive mechanisms used in
many systems. In password authentication scheme, each
user owns his/her identity and password. When he/she wants
to login the computer system, he/she keys in his/her
identity and password by himself/herself. This method,
however, suffers both the peeping attacks where an intruder
stands behind the login user to peep the typed password and the
replay attacks where the intruder intercepts the password from
the network and then impersonates the same user by
replaying the intercepted password. A challenge-response type
human identification scheme, withstands both the peeping and
replay attacks, was proposed by Matsumoto and Imai in 1991.
Each user and the host are assumed to share a common key.
Knowing the common key shared with the user, the host can
decide whether an answer replied from the user is correct or
not. In their scheme, what the user has to do are simply to
memorize a short secret and perform very simple operation
based on the secret. In this thesis, three types of attacks,
referred to here as the chosen challenge attack, the chosen
response attack and the chosen challenge-response attack,
on the human identification schemes are proposed. By
these attacks, a malicious user first impersonates the host
to send a forged challenge to the login user or impersonates
the login user to send a modify response to the host, and then
performs the intercepting or peeping attack to reveal the
login user's secret password.
|
author2 |
Tzonelih Hwang |
author_facet |
Tzonelih Hwang Peng ,Maujy 彭懋芝 |
author |
Peng ,Maujy 彭懋芝 |
spellingShingle |
Peng ,Maujy 彭懋芝 Attacks on Human Identification Schemes |
author_sort |
Peng ,Maujy |
title |
Attacks on Human Identification Schemes |
title_short |
Attacks on Human Identification Schemes |
title_full |
Attacks on Human Identification Schemes |
title_fullStr |
Attacks on Human Identification Schemes |
title_full_unstemmed |
Attacks on Human Identification Schemes |
title_sort |
attacks on human identification schemes |
publishDate |
1995 |
url |
http://ndltd.ncl.edu.tw/handle/54659590209837200105 |
work_keys_str_mv |
AT pengmaujy attacksonhumanidentificationschemes AT péngmàozhī attacksonhumanidentificationschemes AT pengmaujy duōzhǒngrénxìnghuàshēnfènyànzhèngpòjiěfǎ AT péngmàozhī duōzhǒngrénxìnghuàshēnfènyànzhèngpòjiěfǎ |
_version_ |
1716868313291685888 |