Dynamic key password authentication

被引:0
|
作者
Styugin M. [1 ]
机构
[1] Department of Research, Reshetnev Siberian State University of Science and Technology, Krasnoyarsk
基金
俄罗斯基础研究基金会;
关键词
Authentication; Hash functions; Password storage; Passwords; Secret sharing;
D O I
10.1504/IJSN.2019.100090
中图分类号
学科分类号
摘要
Passwords still remain the most popular method of user authentication. Passwords appear to be the easiest way of registration and logging into remote services such as websites. However, passwords also appear to be the most insecure authentication method. One of the most popular attack techniques aimed at compromising passwords is to leak their hashes directly from their storage location to be cracked offline. The paper presents an authentication method with passwords, which complicates carrying out the attacks that succeed in extracting information sufficient for password cracking. The authentication method is called dynamic key password authentication (DKAuth). The method is based on a password ‘blurring’ using a number of network hosts. The ‘blurring’ is performed by encryption of password hash with a key that is not stored anywhere. The key is divided into parts and distributed among a number of different hosts. The key is modified for every password and changes due to change of the number of hosts in the system. Storage and authentication of a dynamic key is arranged so that it can never be recovered completely, that is even assuming cracking or rearrangement of each and every host where DKAuth key data is stored, an adversary will not be able to recover hashes and will have to crack them by brute-force attack. Practical implementation of DKAuth as an authentication service for external websites demonstrated low time and computational requirements for user registration and authentication. © 2019 Inderscience Enterprises Ltd.
引用
收藏
页码:78 / 85
页数:7
相关论文
共 50 条
  • [1] Secure Authentication with Dynamic Password
    Khalid, Zubayr
    Paul, Pritam
    Chattopadhyay, Soummyo Priyo
    Biswas, Anik Naha
    7TH IEEE ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE IEEE IEMCON-2016, 2016,
  • [2] Password based key exchange with mutual authentication
    Jiang, SQ
    Gong, G
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 267 - 279
  • [3] Password authentication without the server public key
    Chang, YF
    Chang, CC
    Liu, YL
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (10) : 3088 - 3091
  • [4] Password authentication key exchange based on key consensus for IoT security
    Zhao, Zongqu
    Ma, Shaoti
    Qin, Panke
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (01): : 837 - 846
  • [5] A steady on the generalized key agreement and password authentication protocol
    Kwon, T
    Song, J
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2000, E83B (09) : 2044 - 2050
  • [6] Time Synchronism of Dynamic Password Status Authentication
    Huang, Weijian
    Guo, Linfeng
    MATERIALS SCIENCE AND ENGINEERING, PTS 1-2, 2011, 179-180 : 156 - 161
  • [7] PASSWORD AUTHENTICATION USING PUBLIC-KEY CRYPTOGRAPHY
    HARN, L
    HUANG, D
    LAIH, CS
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1989, 18 (12) : 1001 - 1017
  • [8] Password authentication key exchange based on key consensus for IoT security
    Zongqu Zhao
    Shaoti Ma
    Panke Qin
    Cluster Computing, 2023, 26 : 1 - 12
  • [9] An improved password authentication key exchange protocol for 802.11 environment
    Yu, SJ
    Song, JS
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2003, PT 2, PROCEEDINGS, 2003, 2668 : 201 - 209
  • [10] Password-based independent authentication and key exchange protocol
    Jung, KS
    Kim, JY
    Chung, TC
    ICICS-PCM 2003, VOLS 1-3, PROCEEDINGS, 2003, : 1908 - 1912