Cryptanalysis and Improvement of Remote User Authentication Schemes Using Strong Passwords
碩士 === 輔仁大學 === 資訊工程學系 === 93 === Authentication using passwords is a popular approach often used today to authenticate users logining any kind of server. Password authentication involves the requesting entity, a user, providing a secret to the receiving entity, a server, which then checks the secre...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/72920323916029131574 |
id |
ndltd-TW-093FJU00392004 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-093FJU003920042015-10-13T13:04:19Z http://ndltd.ncl.edu.tw/handle/72920323916029131574 Cryptanalysis and Improvement of Remote User Authentication Schemes Using Strong Passwords 使用強通行碼之遠端身份認證設計的分析與改進 Min-Hung Chiang 江旻紘 碩士 輔仁大學 資訊工程學系 93 Authentication using passwords is a popular approach often used today to authenticate users logining any kind of server. Password authentication involves the requesting entity, a user, providing a secret to the receiving entity, a server, which then checks the secret against a value recorded earlier to confirm the authenticity of the user. Conventional static password authentication schemes are vulnerable to direct wiretapping attacks, and therefore are unsuitable for open network environments. To meet today’s security requirements, one-time (or dynamic) password authentication schemes have been proposed. Existing one-time password authentication schemes can be categorized into two types, one requires only weak passwords and the other must use strong passwords. A weak password is a password with low entropy, and thus is easily guessable, while a strong password is a password with high entropy, and thus cannot be easily guessed. Up to now, many strongpassword authentication schemes have been proposed, e.g. S/KEY, SAS, and the OSPA scheme. However, none is both secure and practical enough. In 2003, Lin, Shen, and Hwang proposed an improved version of OSPA using smart cards, and is abbreviated as the LSH scheme herein. Unfortunately, Ku, Tsai, and Chen found that the LSH scheme is still vulnerable to a denial-of-service attack and a replay attack. In July 2004, Chang and Chang proposed a token-based strong-password authentication scheme, which was claimed to be an improved version of the LSH scheme. In November 2004, Chen, Lee, and Horng proposed two SAS-like schemes based on smart cards. However, we find that Chang-Chang’s scheme and Chen- Lee-Horng’s schemes still have weaknesses. In this thesis, we analyze the security strength of Chang-Chang’s scheme and Chen-Lee-Horng’s schemes, and then propose two improved strong-password authentication schemes that can withstand the well-known attacks. The first improved scheme, which can be viewed as an improved version of Chang-Chang’s scheme, has been proven to be secure against well-known attacks. In particular, the first improved scheme does not use smart cards, which are required in Chang-Chang’s scheme. However, as the password change cannot be easily and subtly incorporated into the first improved scheme, we propose the second improved scheme, in which the functionality of password change is included within the login phase and can be efficiently executed. Furthermore, the second improved scheme can withstand the well-known attacks as the first improved scheme does. Finally, to improve the practicability of the proposed improved schemes, we suggest that graphical strong passwords can be used as alternatives of textual strong passwords to decrease the memory burden of the user. Wei-Chi Ku 顧維祺 2005 學位論文 ; thesis 0 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 輔仁大學 === 資訊工程學系 === 93 === Authentication using passwords is a popular approach often used today to authenticate
users logining any kind of server. Password authentication involves the
requesting entity, a user, providing a secret to the receiving entity, a server, which
then checks the secret against a value recorded earlier to confirm the authenticity
of the user. Conventional static password authentication schemes are vulnerable
to direct wiretapping attacks, and therefore are unsuitable for open network environments.
To meet today’s security requirements, one-time (or dynamic) password
authentication schemes have been proposed. Existing one-time password authentication
schemes can be categorized into two types, one requires only weak passwords
and the other must use strong passwords. A weak password is a password with
low entropy, and thus is easily guessable, while a strong password is a password
with high entropy, and thus cannot be easily guessed. Up to now, many strongpassword
authentication schemes have been proposed, e.g. S/KEY, SAS, and the
OSPA scheme. However, none is both secure and practical enough. In 2003, Lin,
Shen, and Hwang proposed an improved version of OSPA using smart cards, and is
abbreviated as the LSH scheme herein. Unfortunately, Ku, Tsai, and Chen found
that the LSH scheme is still vulnerable to a denial-of-service attack and a replay
attack. In July 2004, Chang and Chang proposed a token-based strong-password
authentication scheme, which was claimed to be an improved version of the LSH
scheme. In November 2004, Chen, Lee, and Horng proposed two SAS-like schemes
based on smart cards. However, we find that Chang-Chang’s scheme and Chen-
Lee-Horng’s schemes still have weaknesses. In this thesis, we analyze the security
strength of Chang-Chang’s scheme and Chen-Lee-Horng’s schemes, and then propose
two improved strong-password authentication schemes that can withstand the
well-known attacks. The first improved scheme, which can be viewed as an improved
version of Chang-Chang’s scheme, has been proven to be secure against well-known
attacks. In particular, the first improved scheme does not use smart cards, which
are required in Chang-Chang’s scheme. However, as the password change cannot
be easily and subtly incorporated into the first improved scheme, we propose the
second improved scheme, in which the functionality of password change is included
within the login phase and can be efficiently executed. Furthermore, the second improved
scheme can withstand the well-known attacks as the first improved scheme
does. Finally, to improve the practicability of the proposed improved schemes, we
suggest that graphical strong passwords can be used as alternatives of textual strong
passwords to decrease the memory burden of the user.
|
author2 |
Wei-Chi Ku |
author_facet |
Wei-Chi Ku Min-Hung Chiang 江旻紘 |
author |
Min-Hung Chiang 江旻紘 |
spellingShingle |
Min-Hung Chiang 江旻紘 Cryptanalysis and Improvement of Remote User Authentication Schemes Using Strong Passwords |
author_sort |
Min-Hung Chiang |
title |
Cryptanalysis and Improvement of Remote User Authentication Schemes Using Strong Passwords |
title_short |
Cryptanalysis and Improvement of Remote User Authentication Schemes Using Strong Passwords |
title_full |
Cryptanalysis and Improvement of Remote User Authentication Schemes Using Strong Passwords |
title_fullStr |
Cryptanalysis and Improvement of Remote User Authentication Schemes Using Strong Passwords |
title_full_unstemmed |
Cryptanalysis and Improvement of Remote User Authentication Schemes Using Strong Passwords |
title_sort |
cryptanalysis and improvement of remote user authentication schemes using strong passwords |
publishDate |
2005 |
url |
http://ndltd.ncl.edu.tw/handle/72920323916029131574 |
work_keys_str_mv |
AT minhungchiang cryptanalysisandimprovementofremoteuserauthenticationschemesusingstrongpasswords AT jiāngmínhóng cryptanalysisandimprovementofremoteuserauthenticationschemesusingstrongpasswords AT minhungchiang shǐyòngqiángtōngxíngmǎzhīyuǎnduānshēnfènrènzhèngshèjìdefēnxīyǔgǎijìn AT jiāngmínhóng shǐyòngqiángtōngxíngmǎzhīyuǎnduānshēnfènrènzhèngshèjìdefēnxīyǔgǎijìn |
_version_ |
1717730252312018944 |