Authentication by Encrypted Negative Password

被引:23
|
作者
Luo, Wenjian [1 ,2 ]
Hu, Yamin [1 ,2 ]
Jiang, Hao [1 ,2 ]
Wang, Junteng [1 ,2 ]
机构
[1] Univ Sci & Technol China, Sch Comp Sci & Technol, Hefei 230027, Anhui, Peoples R China
[2] Univ Sci & Technol China, Anhui Prov Key Lab Software Engn Comp & Commun, Hefei 230027, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; dictionary attack; lookup table attack; negative database; secure password storage; INFORMATION; ATTACK;
D O I
10.1109/TIFS.2018.2844854
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure password storage is a vital aspect in systems based on password authentication, which is still the most widely used authentication technique, despite some security flaws. In this paper, we propose a password authentication framework that is designed for secure password storage and could be easily integrated into existing authentication systems. In our framework, first, the received plain password from a client is hashed through a cryptographic hash function (e.g., SHA-256). Then, the hashed password is converted into a negative password. Finally, the negative password is encrypted into an encrypted negative password (ENP) using a symmetric-key algorithm (e.g., AES), and multi-iteration encryption could be employed to further improve security. The cryptographic hash function and symmetric encryption make it difficult to crack passwords from ENPs. Moreover, there are lots of corresponding ENPs for a given plain password, which makes precomputation attacks (e.g., lookup table attack and rainbow table attack) infeasible. The algorithm complexity analyses and comparisons show that the ENP could resist lookup table attack and provide stronger password protection under dictionary attack. It is worth mentioning that the ENP does not introduce extra elements (e.g., salt); besides this, the ENP could still resist precomputation attacks. Most importantly, the ENP is the first password protection scheme that combines the cryptographic hash function, the negative password, and the symmetric-key algorithm, without the need for additional information except the plain password.
引用
收藏
页码:114 / 128
页数:15
相关论文
共 50 条
  • [1] Encrypted Negative Password Identification Exploitation RSA Rule
    Sai, N. Raghavendra
    Cherukuri, Tejaswi
    Susmita, B.
    Keerthana, R.
    Anjali, Y.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 841 - 844
  • [2] One-time password password authentication scheme based on the negative database
    Zhao, Dongdong
    Luo, Wenjian
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2017, 62 : 396 - 404
  • [3] AuthStore: Password-based Authentication and Encrypted Data Storage in Untrusted Environments
    Zeidler, Clemens
    Asghar, Muhammad Rizwan
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 996 - 1001
  • [4] PASSWORD AUTHENTICATION WITHOUT USING A PASSWORD TABLE
    HORNG, GB
    INFORMATION PROCESSING LETTERS, 1995, 55 (05) : 247 - 250
  • [5] A password authentication scheme with secure password updating
    Lin, CL
    Hwang, T
    COMPUTERS & SECURITY, 2003, 22 (01) : 68 - 72
  • [6] Single password authentication
    Acar, Tolga
    Belenkiy, Mira
    Kupcu, Alptekin
    COMPUTER NETWORKS, 2013, 57 (13) : 2597 - 2614
  • [7] Evaluation of Password Encrypted Key Exchange authentication Techniques: Design approach perspective Evaluation of PAKE Protocol
    Vollala, Satyanarayana
    Indrajeet, S.
    Begum, B. Shameedha
    Ramasubramanian, N.
    PROCEEDINGS OF THE 1ST INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND MACHINE LEARNING (IML'17), 2017,
  • [8] Password - a form of authentication
    Cisar, P.
    Cisar, S. Maravic
    2007 5TH INTERNATIONAL SYMPOSIUM ON INTELLIGENT SYSTEMS & INFORMATICS, 2007, : 23 - +
  • [9] MonoPass: A Password Manager without Master Password Authentication
    Jeong, Hyeonhak
    Jung, Hyunggu
    26TH INTERNATIONAL CONFERENCE ON INTELLIGENT USER INTERFACES (IUI '21 COMPANION), 2021, : 52 - 54
  • [10] Strong password authentication with AKA authentication mechanism
    Dostalek, Libor
    Safarik, Jiri
    2017 INTERNATIONAL CONFERENCE ON APPLIED ELECTRONICS (AE), 2017, : 49 - 54