Dynamic key password authentication

被引:0
|
作者
Styugin M. [1 ]
机构
[1] Department of Research, Reshetnev Siberian State University of Science and Technology, Krasnoyarsk
基金
俄罗斯基础研究基金会;
关键词
Authentication; Hash functions; Password storage; Passwords; Secret sharing;
D O I
10.1504/IJSN.2019.100090
中图分类号
学科分类号
摘要
Passwords still remain the most popular method of user authentication. Passwords appear to be the easiest way of registration and logging into remote services such as websites. However, passwords also appear to be the most insecure authentication method. One of the most popular attack techniques aimed at compromising passwords is to leak their hashes directly from their storage location to be cracked offline. The paper presents an authentication method with passwords, which complicates carrying out the attacks that succeed in extracting information sufficient for password cracking. The authentication method is called dynamic key password authentication (DKAuth). The method is based on a password ‘blurring’ using a number of network hosts. The ‘blurring’ is performed by encryption of password hash with a key that is not stored anywhere. The key is divided into parts and distributed among a number of different hosts. The key is modified for every password and changes due to change of the number of hosts in the system. Storage and authentication of a dynamic key is arranged so that it can never be recovered completely, that is even assuming cracking or rearrangement of each and every host where DKAuth key data is stored, an adversary will not be able to recover hashes and will have to crack them by brute-force attack. Practical implementation of DKAuth as an authentication service for external websites demonstrated low time and computational requirements for user registration and authentication. © 2019 Inderscience Enterprises Ltd.
引用
收藏
页码:78 / 85
页数:7
相关论文
共 50 条
  • [41] A Four-Party Password-based Authentication Key Exchange Protocol
    Liu, Xiumei
    Liu, Junjiang
    Chang, Guiran
    2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, : 280 - 283
  • [42] DYNAMIC PASSWORD BASED REMOTE USER AUTHENTICATION WITHOUT TIME STAMPING
    Eldefrawy, Mohamed Hamdy
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2013, 9 (01): : 33 - 45
  • [43] Dynamic password authentication method using a one-way function
    Shimizu, Akihiro
    Systems and Computers in Japan, 1991, 22 (07) : 32 - 40
  • [44] A robust authentication scheme with dynamic password for wireless body area networks
    Liu, Xin
    Zhang, Ruisheng
    Zhao, Mingqi
    COMPUTER NETWORKS, 2019, 161 : 220 - 234
  • [45] Robust Multi-Factor Authentication for WSNs With Dynamic Password Recovery
    Zhu, Liufu
    Wang, Ding
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8398 - 8413
  • [46] MonoPass: A Password Manager without Master Password Authentication
    Jeong, Hyeonhak
    Jung, Hyunggu
    26TH INTERNATIONAL CONFERENCE ON INTELLIGENT USER INTERFACES (IUI '21 COMPANION), 2021, : 52 - 54
  • [47] Strong password authentication with AKA authentication mechanism
    Dostalek, Libor
    Safarik, Jiri
    2017 INTERNATIONAL CONFERENCE ON APPLIED ELECTRONICS (AE), 2017, : 49 - 54
  • [48] Cryptanalysis of Password Authentication System
    Aboud, Sattar J.
    Al-fayoumi, Mohammad
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2014, : 14 - 17
  • [49] PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION
    LAMPORT, L
    COMMUNICATIONS OF THE ACM, 1981, 24 (11) : 770 - 772
  • [50] Authentication by Encrypted Negative Password
    Luo, Wenjian
    Hu, Yamin
    Jiang, Hao
    Wang, Junteng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (01) : 114 - 128