Authentication by Encrypted Negative Password

被引:23
|
作者
Luo, Wenjian [1 ,2 ]
Hu, Yamin [1 ,2 ]
Jiang, Hao [1 ,2 ]
Wang, Junteng [1 ,2 ]
机构
[1] Univ Sci & Technol China, Sch Comp Sci & Technol, Hefei 230027, Anhui, Peoples R China
[2] Univ Sci & Technol China, Anhui Prov Key Lab Software Engn Comp & Commun, Hefei 230027, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; dictionary attack; lookup table attack; negative database; secure password storage; INFORMATION; ATTACK;
D O I
10.1109/TIFS.2018.2844854
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure password storage is a vital aspect in systems based on password authentication, which is still the most widely used authentication technique, despite some security flaws. In this paper, we propose a password authentication framework that is designed for secure password storage and could be easily integrated into existing authentication systems. In our framework, first, the received plain password from a client is hashed through a cryptographic hash function (e.g., SHA-256). Then, the hashed password is converted into a negative password. Finally, the negative password is encrypted into an encrypted negative password (ENP) using a symmetric-key algorithm (e.g., AES), and multi-iteration encryption could be employed to further improve security. The cryptographic hash function and symmetric encryption make it difficult to crack passwords from ENPs. Moreover, there are lots of corresponding ENPs for a given plain password, which makes precomputation attacks (e.g., lookup table attack and rainbow table attack) infeasible. The algorithm complexity analyses and comparisons show that the ENP could resist lookup table attack and provide stronger password protection under dictionary attack. It is worth mentioning that the ENP does not introduce extra elements (e.g., salt); besides this, the ENP could still resist precomputation attacks. Most importantly, the ENP is the first password protection scheme that combines the cryptographic hash function, the negative password, and the symmetric-key algorithm, without the need for additional information except the plain password.
引用
收藏
页码:114 / 128
页数:15
相关论文
共 50 条
  • [31] Secure password authentication for distributed computing
    Jung, Scung Wook
    Jung, Souhwan
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 491 - 501
  • [32] Simple remote password authentication scheme
    Shi, Ronghua
    Hu, Xiangling
    Jisuanji Gongcheng/Computer Engineering, 24 (09): : 43 - 44
  • [33] Password authentication schemes on a quantum computer
    Wang, Sherry
    Adams, Carlisle
    Broadbent, Anne
    2021 IEEE INTERNATIONAL CONFERENCE ON QUANTUM COMPUTING AND ENGINEERING (QCE 2021) / QUANTUM WEEK 2021, 2021, : 346 - 350
  • [34] Employing Smartwatch for Enhanced Password Authentication
    Chang, Bing
    Liu, Ximing
    Li, Yingjiu
    Wang, Pingjian
    Zhu, Wen-Tao
    Wang, Zhan
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017, 2017, 10251 : 691 - 703
  • [35] Further analysis of password authentication schemes based on authentication tests
    Jiang, R
    Pan, L
    Li, JH
    COMPUTERS & SECURITY, 2004, 23 (06) : 469 - 477
  • [36] Towards Practical Anonymous Password Authentication
    Yang, Yanjiang
    Zhou, Jianying
    Wong, Jun Wen
    Bao, Feng
    26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), 2010, : 59 - 68
  • [37] Keystroke dynamics in password authentication enhancement
    Teh, Pin Shen
    Teoh, Andrew Beng Jin
    Tee, Connie
    Ong, Thian Song
    EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (12) : 8618 - 8627
  • [38] REMOTE PASSWORD AUTHENTICATION WITH SMART CARDS
    CHANG, CC
    WU, TC
    IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1991, 138 (03): : 165 - 168
  • [39] Hardening the Virtual Password Authentication Scheme
    Rahiemy, Mohammad Zakie Faiz
    Sukarno, Parman
    Jadied, Erwid Musthofa
    2018 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2018, : 429 - 434
  • [40] An improved optimal strong password authentication
    An, Young-Hwa
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 121 - 124