Cryptanalysis and Improvement of Remote User Authentication Schemes Using Strong Passwords

碩士 === 輔仁大學 === 資訊工程學系 === 93 === Authentication using passwords is a popular approach often used today to authenticate users logining any kind of server. Password authentication involves the requesting entity, a user, providing a secret to the receiving entity, a server, which then checks the secre...

Full description

Bibliographic Details
Main Authors: Min-Hung Chiang, 江旻紘
Other Authors: Wei-Chi Ku
Format: Others
Language:en_US
Published: 2005
Online Access:http://ndltd.ncl.edu.tw/handle/72920323916029131574
id ndltd-TW-093FJU00392004
record_format oai_dc
spelling ndltd-TW-093FJU003920042015-10-13T13:04:19Z http://ndltd.ncl.edu.tw/handle/72920323916029131574 Cryptanalysis and Improvement of Remote User Authentication Schemes Using Strong Passwords 使用強通行碼之遠端身份認證設計的分析與改進 Min-Hung Chiang 江旻紘 碩士 輔仁大學 資訊工程學系 93 Authentication using passwords is a popular approach often used today to authenticate users logining any kind of server. Password authentication involves the requesting entity, a user, providing a secret to the receiving entity, a server, which then checks the secret against a value recorded earlier to confirm the authenticity of the user. Conventional static password authentication schemes are vulnerable to direct wiretapping attacks, and therefore are unsuitable for open network environments. To meet today’s security requirements, one-time (or dynamic) password authentication schemes have been proposed. Existing one-time password authentication schemes can be categorized into two types, one requires only weak passwords and the other must use strong passwords. A weak password is a password with low entropy, and thus is easily guessable, while a strong password is a password with high entropy, and thus cannot be easily guessed. Up to now, many strongpassword authentication schemes have been proposed, e.g. S/KEY, SAS, and the OSPA scheme. However, none is both secure and practical enough. In 2003, Lin, Shen, and Hwang proposed an improved version of OSPA using smart cards, and is abbreviated as the LSH scheme herein. Unfortunately, Ku, Tsai, and Chen found that the LSH scheme is still vulnerable to a denial-of-service attack and a replay attack. In July 2004, Chang and Chang proposed a token-based strong-password authentication scheme, which was claimed to be an improved version of the LSH scheme. In November 2004, Chen, Lee, and Horng proposed two SAS-like schemes based on smart cards. However, we find that Chang-Chang’s scheme and Chen- Lee-Horng’s schemes still have weaknesses. In this thesis, we analyze the security strength of Chang-Chang’s scheme and Chen-Lee-Horng’s schemes, and then propose two improved strong-password authentication schemes that can withstand the well-known attacks. The first improved scheme, which can be viewed as an improved version of Chang-Chang’s scheme, has been proven to be secure against well-known attacks. In particular, the first improved scheme does not use smart cards, which are required in Chang-Chang’s scheme. However, as the password change cannot be easily and subtly incorporated into the first improved scheme, we propose the second improved scheme, in which the functionality of password change is included within the login phase and can be efficiently executed. Furthermore, the second improved scheme can withstand the well-known attacks as the first improved scheme does. Finally, to improve the practicability of the proposed improved schemes, we suggest that graphical strong passwords can be used as alternatives of textual strong passwords to decrease the memory burden of the user. Wei-Chi Ku 顧維祺 2005 學位論文 ; thesis 0 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 輔仁大學 === 資訊工程學系 === 93 === Authentication using passwords is a popular approach often used today to authenticate users logining any kind of server. Password authentication involves the requesting entity, a user, providing a secret to the receiving entity, a server, which then checks the secret against a value recorded earlier to confirm the authenticity of the user. Conventional static password authentication schemes are vulnerable to direct wiretapping attacks, and therefore are unsuitable for open network environments. To meet today’s security requirements, one-time (or dynamic) password authentication schemes have been proposed. Existing one-time password authentication schemes can be categorized into two types, one requires only weak passwords and the other must use strong passwords. A weak password is a password with low entropy, and thus is easily guessable, while a strong password is a password with high entropy, and thus cannot be easily guessed. Up to now, many strongpassword authentication schemes have been proposed, e.g. S/KEY, SAS, and the OSPA scheme. However, none is both secure and practical enough. In 2003, Lin, Shen, and Hwang proposed an improved version of OSPA using smart cards, and is abbreviated as the LSH scheme herein. Unfortunately, Ku, Tsai, and Chen found that the LSH scheme is still vulnerable to a denial-of-service attack and a replay attack. In July 2004, Chang and Chang proposed a token-based strong-password authentication scheme, which was claimed to be an improved version of the LSH scheme. In November 2004, Chen, Lee, and Horng proposed two SAS-like schemes based on smart cards. However, we find that Chang-Chang’s scheme and Chen- Lee-Horng’s schemes still have weaknesses. In this thesis, we analyze the security strength of Chang-Chang’s scheme and Chen-Lee-Horng’s schemes, and then propose two improved strong-password authentication schemes that can withstand the well-known attacks. The first improved scheme, which can be viewed as an improved version of Chang-Chang’s scheme, has been proven to be secure against well-known attacks. In particular, the first improved scheme does not use smart cards, which are required in Chang-Chang’s scheme. However, as the password change cannot be easily and subtly incorporated into the first improved scheme, we propose the second improved scheme, in which the functionality of password change is included within the login phase and can be efficiently executed. Furthermore, the second improved scheme can withstand the well-known attacks as the first improved scheme does. Finally, to improve the practicability of the proposed improved schemes, we suggest that graphical strong passwords can be used as alternatives of textual strong passwords to decrease the memory burden of the user.
author2 Wei-Chi Ku
author_facet Wei-Chi Ku
Min-Hung Chiang
江旻紘
author Min-Hung Chiang
江旻紘
spellingShingle Min-Hung Chiang
江旻紘
Cryptanalysis and Improvement of Remote User Authentication Schemes Using Strong Passwords
author_sort Min-Hung Chiang
title Cryptanalysis and Improvement of Remote User Authentication Schemes Using Strong Passwords
title_short Cryptanalysis and Improvement of Remote User Authentication Schemes Using Strong Passwords
title_full Cryptanalysis and Improvement of Remote User Authentication Schemes Using Strong Passwords
title_fullStr Cryptanalysis and Improvement of Remote User Authentication Schemes Using Strong Passwords
title_full_unstemmed Cryptanalysis and Improvement of Remote User Authentication Schemes Using Strong Passwords
title_sort cryptanalysis and improvement of remote user authentication schemes using strong passwords
publishDate 2005
url http://ndltd.ncl.edu.tw/handle/72920323916029131574
work_keys_str_mv AT minhungchiang cryptanalysisandimprovementofremoteuserauthenticationschemesusingstrongpasswords
AT jiāngmínhóng cryptanalysisandimprovementofremoteuserauthenticationschemesusingstrongpasswords
AT minhungchiang shǐyòngqiángtōngxíngmǎzhīyuǎnduānshēnfènrènzhèngshèjìdefēnxīyǔgǎijìn
AT jiāngmínhóng shǐyòngqiángtōngxíngmǎzhīyuǎnduānshēnfènrènzhèngshèjìdefēnxīyǔgǎijìn
_version_ 1717730252312018944