Authentication by Encrypted Negative Password

被引:23
|
作者
Luo, Wenjian [1 ,2 ]
Hu, Yamin [1 ,2 ]
Jiang, Hao [1 ,2 ]
Wang, Junteng [1 ,2 ]
机构
[1] Univ Sci & Technol China, Sch Comp Sci & Technol, Hefei 230027, Anhui, Peoples R China
[2] Univ Sci & Technol China, Anhui Prov Key Lab Software Engn Comp & Commun, Hefei 230027, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; dictionary attack; lookup table attack; negative database; secure password storage; INFORMATION; ATTACK;
D O I
10.1109/TIFS.2018.2844854
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure password storage is a vital aspect in systems based on password authentication, which is still the most widely used authentication technique, despite some security flaws. In this paper, we propose a password authentication framework that is designed for secure password storage and could be easily integrated into existing authentication systems. In our framework, first, the received plain password from a client is hashed through a cryptographic hash function (e.g., SHA-256). Then, the hashed password is converted into a negative password. Finally, the negative password is encrypted into an encrypted negative password (ENP) using a symmetric-key algorithm (e.g., AES), and multi-iteration encryption could be employed to further improve security. The cryptographic hash function and symmetric encryption make it difficult to crack passwords from ENPs. Moreover, there are lots of corresponding ENPs for a given plain password, which makes precomputation attacks (e.g., lookup table attack and rainbow table attack) infeasible. The algorithm complexity analyses and comparisons show that the ENP could resist lookup table attack and provide stronger password protection under dictionary attack. It is worth mentioning that the ENP does not introduce extra elements (e.g., salt); besides this, the ENP could still resist precomputation attacks. Most importantly, the ENP is the first password protection scheme that combines the cryptographic hash function, the negative password, and the symmetric-key algorithm, without the need for additional information except the plain password.
引用
收藏
页码:114 / 128
页数:15
相关论文
共 50 条
  • [21] Accessible authentication: dyslexia and password strategies
    Renaud, Karen
    Johnson, Graham
    Ophoff, Jacques
    INFORMATION AND COMPUTER SECURITY, 2021, 29 (04) : 604 - 624
  • [22] Authentication using Alignment of the Graphical Password
    Shenoy, Manjula
    Supriya, A.
    PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON ADVANCED INFORMATICS FOR COMPUTING RESEARCH (ICAICR '19), 2019,
  • [23] Password authentication schemes with smart cards
    Yang, WH
    Shieh, SP
    COMPUTERS & SECURITY, 1999, 18 (08) : 727 - 733
  • [24] Fingerprint Protected Password Authentication Protocol
    Yang, Chao
    Zhang, Junwei
    Guo, Jingjing
    Zheng, Yu
    Yang, Li
    Ma, Jianfeng
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [25] REMOTE PASSWORD AUTHENTICATION WITH SMART CARDS
    CHANG, CC
    LAIH, CS
    IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1992, 139 (04): : 372 - 372
  • [26] A signature based password authentication method
    Fung, GSK
    Lau, RWH
    Liu, JNK
    SMC '97 CONFERENCE PROCEEDINGS - 1997 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5: CONFERENCE THEME: COMPUTATIONAL CYBERNETICS AND SIMULATION, 1997, : 631 - 636
  • [27] AUTHENTICATION USING TEXT AND GRAPHICAL PASSWORD
    Joshi, Abhilash M.
    Muniyal, Balachandra
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 381 - 386
  • [28] Secure password authentication for distributed computing
    Jung, Seung Wook
    Jung, Souhwan
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1345 - 1350
  • [29] Musical Password based Biometric Authentication
    Prakash, Ravi
    Kumar, Suresh
    Kumar, Chandan
    Mishra, K. K.
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1016 - 1019
  • [30] Cryptanalysis of a remote password authentication scheme
    Chan, CK
    Cheng, LM
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2001, 78 (03) : 323 - 326