Dynamic key password authentication

被引:0
|
作者
Styugin M. [1 ]
机构
[1] Department of Research, Reshetnev Siberian State University of Science and Technology, Krasnoyarsk
基金
俄罗斯基础研究基金会;
关键词
Authentication; Hash functions; Password storage; Passwords; Secret sharing;
D O I
10.1504/IJSN.2019.100090
中图分类号
学科分类号
摘要
Passwords still remain the most popular method of user authentication. Passwords appear to be the easiest way of registration and logging into remote services such as websites. However, passwords also appear to be the most insecure authentication method. One of the most popular attack techniques aimed at compromising passwords is to leak their hashes directly from their storage location to be cracked offline. The paper presents an authentication method with passwords, which complicates carrying out the attacks that succeed in extracting information sufficient for password cracking. The authentication method is called dynamic key password authentication (DKAuth). The method is based on a password ‘blurring’ using a number of network hosts. The ‘blurring’ is performed by encryption of password hash with a key that is not stored anywhere. The key is divided into parts and distributed among a number of different hosts. The key is modified for every password and changes due to change of the number of hosts in the system. Storage and authentication of a dynamic key is arranged so that it can never be recovered completely, that is even assuming cracking or rearrangement of each and every host where DKAuth key data is stored, an adversary will not be able to recover hashes and will have to crack them by brute-force attack. Practical implementation of DKAuth as an authentication service for external websites demonstrated low time and computational requirements for user registration and authentication. © 2019 Inderscience Enterprises Ltd.
引用
收藏
页码:78 / 85
页数:7
相关论文
共 50 条
  • [31] PASSWORD AUTHENTICATION WITHOUT USING A PASSWORD TABLE
    HORNG, GB
    INFORMATION PROCESSING LETTERS, 1995, 55 (05) : 247 - 250
  • [32] A password authentication scheme with secure password updating
    Lin, CL
    Hwang, T
    COMPUTERS & SECURITY, 2003, 22 (01) : 68 - 72
  • [33] Two-factor (biometric and password) authentication key exchange on lattice based on key consensus
    Zhao Zongqu
    Ma Shaoti
    Wang Yongjun
    Tang Yongli
    Ye Qing
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2020, 27 (06) : 42 - 53
  • [34] Single password authentication
    Acar, Tolga
    Belenkiy, Mira
    Kupcu, Alptekin
    COMPUTER NETWORKS, 2013, 57 (13) : 2597 - 2614
  • [35] Password - a form of authentication
    Cisar, P.
    Cisar, S. Maravic
    2007 5TH INTERNATIONAL SYMPOSIUM ON INTELLIGENT SYSTEMS & INFORMATICS, 2007, : 23 - +
  • [36] Password-based dynamic group key agreement
    Ma, Chunbo
    Ao, Jun
    Li, Jianhua
    2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 203 - +
  • [37] A new architecture for user authentication and key exchange using password for federated enterprises
    Yang, YJ
    Bao, F
    Deng, RH
    SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 2005, 181 : 95 - 111
  • [38] Three-Party Password Authentication and Key Exchange Protocol Based on MLWE
    Guo, Songhui
    Song, Yunfan
    Guo, Song
    Yang, Yeming
    Song, Shuaichao
    SYMMETRY-BASEL, 2023, 15 (09):
  • [39] Password-based authentication and key distribution protocols with perfect forward secrecy
    Sun, Hung-Min
    Yeh, Her-Tyan
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2006, 72 (06) : 1002 - 1011
  • [40] Secured Authentication Using Anonymity and Password-Based Key Derivation Function
    Saad, Mohd Izuan Mohd
    Abd Jalil, Kamarularifin
    Manaf, Mazani
    MOBILE WEB AND INTELLIGENT INFORMATION SYSTEMS, (MOBIWIS 2016), 2016, 9847 : 184 - 197