Studying Authentication of Electronic Society

碩士 === 國立臺灣師範大學 === 工業教育研究所 === 86 === Traditional methods of user authenticatior systems suffer from an important weakness which degree of randomness in secrets that human being can identification. Even though weak secrets (passwords and Personal Identification Number, PIN) are typically not expos...

Full description

Bibliographic Details
Main Author: 莊慶郎
Other Authors: 樊國楨
Format: Others
Language:zh-TW
Published: 1998
Online Access:http://ndltd.ncl.edu.tw/handle/84261389219453371175
id ndltd-TW-086NTNU3037014
record_format oai_dc
spelling ndltd-TW-086NTNU30370142016-06-29T04:13:35Z http://ndltd.ncl.edu.tw/handle/84261389219453371175 Studying Authentication of Electronic Society 電子化社會身份鑑別機制探討之研究 莊慶郎 碩士 國立臺灣師範大學 工業教育研究所 86 Traditional methods of user authenticatior systems suffer from an important weakness which degree of randomness in secrets that human being can identification. Even though weak secrets (passwords and Personal Identification Number, PIN) are typically not exposed in the clear over the communication lines, they can be discovered with off-line brute force attacks based on exhaustive trials. Since such secrets are chosen from a relatively small key space, a determined adversary can try all possible values until a match is found between the trial values and the message recorded from a genuine authentication session. Authentication devices like smardcards offer an attractive solution by providing a user with a cryptographically strong key for authentication. In contrast to passwords and PINs, the device's key can be chosen from a much larger key space thus making a brute force attack computationally infeasible or, at least difficult. First, this paper provides information of application on miscellaneous information security analysis on authentication to contemporary computer users and system service operators in business, bank and government. These security protocols include Kerberos, KryptoKnight, SESAME, Key Administration Standard of IBM computer security, Pretty Good Privacy(PGP), Privacy- Enhanced Mail(PEM), and Universal Electronic Payment System(UEPS). It is crucial to select an appropriate protocol since different protocol will affect system performance. Second, in this paper we present an authentication method whereby the authentication device (a token card) is used solely to provide a secure channel between a human user and an authentication server (AS). Since the communication channel is secured by the card, the user can still utilize weak secrets for authentication purposes, without any risk of exposure. Furthermore, the card's and the user's secrets are mutually independent, i.e., the card is not associated with any particular user. Since the card is impersonal, it can be freely shared by several users. This eliminates the high cost of administration which is typical of existing designs requiring fixed user-device relationship. Moreover, our method does not require any coupling between the token card and the workstation which would be difficult to implement on a global scale and retrofit onto existing equipment. 樊國楨 何宏發 1998 學位論文 ; thesis 118 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立臺灣師範大學 === 工業教育研究所 === 86 === Traditional methods of user authenticatior systems suffer from an important weakness which degree of randomness in secrets that human being can identification. Even though weak secrets (passwords and Personal Identification Number, PIN) are typically not exposed in the clear over the communication lines, they can be discovered with off-line brute force attacks based on exhaustive trials. Since such secrets are chosen from a relatively small key space, a determined adversary can try all possible values until a match is found between the trial values and the message recorded from a genuine authentication session. Authentication devices like smardcards offer an attractive solution by providing a user with a cryptographically strong key for authentication. In contrast to passwords and PINs, the device's key can be chosen from a much larger key space thus making a brute force attack computationally infeasible or, at least difficult. First, this paper provides information of application on miscellaneous information security analysis on authentication to contemporary computer users and system service operators in business, bank and government. These security protocols include Kerberos, KryptoKnight, SESAME, Key Administration Standard of IBM computer security, Pretty Good Privacy(PGP), Privacy- Enhanced Mail(PEM), and Universal Electronic Payment System(UEPS). It is crucial to select an appropriate protocol since different protocol will affect system performance. Second, in this paper we present an authentication method whereby the authentication device (a token card) is used solely to provide a secure channel between a human user and an authentication server (AS). Since the communication channel is secured by the card, the user can still utilize weak secrets for authentication purposes, without any risk of exposure. Furthermore, the card's and the user's secrets are mutually independent, i.e., the card is not associated with any particular user. Since the card is impersonal, it can be freely shared by several users. This eliminates the high cost of administration which is typical of existing designs requiring fixed user-device relationship. Moreover, our method does not require any coupling between the token card and the workstation which would be difficult to implement on a global scale and retrofit onto existing equipment.
author2 樊國楨
author_facet 樊國楨
莊慶郎
author 莊慶郎
spellingShingle 莊慶郎
Studying Authentication of Electronic Society
author_sort 莊慶郎
title Studying Authentication of Electronic Society
title_short Studying Authentication of Electronic Society
title_full Studying Authentication of Electronic Society
title_fullStr Studying Authentication of Electronic Society
title_full_unstemmed Studying Authentication of Electronic Society
title_sort studying authentication of electronic society
publishDate 1998
url http://ndltd.ncl.edu.tw/handle/84261389219453371175
work_keys_str_mv AT zhuāngqìngláng studyingauthenticationofelectronicsociety
AT zhuāngqìngláng diànzihuàshèhuìshēnfènjiànbiéjīzhìtàntǎozhīyánjiū
_version_ 1718326689456455680