Security analysis of secure password authentication for keystroke dynamics

被引:0
|
作者
Song, Hyunsoo [1 ]
Kwon, Taekyoung [1 ]
机构
[1] Sejong Univ, Informat Secur Lab, Seoul 143747, South Korea
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Password-based authentication and key distribution are important in today's computing environment. Since passwords are easy to remember for human users, the password-based system is used widely. However, due to the fact that the passwords are chosen from small space, the password-based schemes are more susceptible to various attacks including password guessing attacks. Recently, Choe and Kim proposed a new password authentication scheme for keystroke dynamics. However, in this paper, we cryptanalyze the Choe-Kim scheme and show it is vulnerable to various types of attacks such as server-deception attacks, server-impersonation attacks and password guessing attacks. We also comment on the scheme that more care must be taken when designing password-based schemes and briefly show how the standard like IEEE P1363.2 can be used for strengthening those schemes.
引用
收藏
页码:916 / 923
页数:8
相关论文
共 50 条
  • [21] A novel security scheme for behavioral authentication systems based on keystroke dynamics
    Salem, Asma
    Obaidat, Mohammad S.
    SECURITY AND PRIVACY, 2019, 2 (02):
  • [22] Secure password authentication for distributed computing
    Jung, Seung Wook
    Jung, Souhwan
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1345 - 1350
  • [23] Secure password authentication for distributed computing
    Jung, Scung Wook
    Jung, Souhwan
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 491 - 501
  • [24] Piezoelectric and Machine Learning Based Keystroke Dynamics for Highly Secure User Authentication
    Tang, Chenyu
    Cui, Ziang
    Chu, Meng
    Lu, Yujiao
    Zhou, Fuqiang
    Gao, Shuo
    IEEE SENSORS JOURNAL, 2023, 23 (20) : 24070 - 24077
  • [25] Secure, Usable and Privacy-Friendly User Authentication from Keystroke Dynamics
    Halunen, Kimmo
    Vallivaara, Visa
    SECURE IT SYSTEMS, NORDSEC 2016, 2016, 10014 : 256 - 268
  • [26] Dynamic Password Authentication : Designing Step and Security Analysis
    Pansa, Detchasit
    Chomsiri, Thawatchai
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 518 - 523
  • [27] Keystroke dynamics as a biometric for authentication
    Monrose, F
    Rubin, AD
    FUTURE GENERATION COMPUTER SYSTEMS, 2000, 16 (04) : 351 - 359
  • [28] Keystroke Dynamics for Continuous Authentication
    Ananya
    Singh, Saurabh
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 205 - 208
  • [29] Keystroke Dynamics Support for Authentication
    Patel, Mayank Sachan Sardar
    Joshi, Padmaja
    Patel, Nataasha Raul Sardar
    2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, : 186 - 191
  • [30] Keystroke dynamics for authentication in smartphone
    Roh, Jong-hyuk
    Lee, Sung-Hun
    Kim, Soohyung
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 1155 - 1159