Authentication by Encrypted Negative Password

被引:23
|
作者
Luo, Wenjian [1 ,2 ]
Hu, Yamin [1 ,2 ]
Jiang, Hao [1 ,2 ]
Wang, Junteng [1 ,2 ]
机构
[1] Univ Sci & Technol China, Sch Comp Sci & Technol, Hefei 230027, Anhui, Peoples R China
[2] Univ Sci & Technol China, Anhui Prov Key Lab Software Engn Comp & Commun, Hefei 230027, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; dictionary attack; lookup table attack; negative database; secure password storage; INFORMATION; ATTACK;
D O I
10.1109/TIFS.2018.2844854
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure password storage is a vital aspect in systems based on password authentication, which is still the most widely used authentication technique, despite some security flaws. In this paper, we propose a password authentication framework that is designed for secure password storage and could be easily integrated into existing authentication systems. In our framework, first, the received plain password from a client is hashed through a cryptographic hash function (e.g., SHA-256). Then, the hashed password is converted into a negative password. Finally, the negative password is encrypted into an encrypted negative password (ENP) using a symmetric-key algorithm (e.g., AES), and multi-iteration encryption could be employed to further improve security. The cryptographic hash function and symmetric encryption make it difficult to crack passwords from ENPs. Moreover, there are lots of corresponding ENPs for a given plain password, which makes precomputation attacks (e.g., lookup table attack and rainbow table attack) infeasible. The algorithm complexity analyses and comparisons show that the ENP could resist lookup table attack and provide stronger password protection under dictionary attack. It is worth mentioning that the ENP does not introduce extra elements (e.g., salt); besides this, the ENP could still resist precomputation attacks. Most importantly, the ENP is the first password protection scheme that combines the cryptographic hash function, the negative password, and the symmetric-key algorithm, without the need for additional information except the plain password.
引用
收藏
页码:114 / 128
页数:15
相关论文
共 50 条
  • [41] On the security of some password authentication protocols
    Hsieh, BT
    Sun, HM
    Hwang, T
    INFORMATICA, 2003, 14 (02) : 195 - 204
  • [42] Password Authentication using Keystroke Biometrics
    D'Lima, Nathan
    Mittal, Jayashri
    2015 International Conference on Communication, Information & Computing Technology (ICCICT), 2015,
  • [43] Better Authentication: Password Revolution by Evolution
    Thomas, Daniel R.
    Beresford, Alastair R.
    SECURITY PROTOCOLS XXII, 2014, 8809 : 130 - 145
  • [44] A New Approach for Anonymous Password Authentication
    Yang, Yanjiang
    Zhou, Jianying
    Weng, Jian
    Bao, Feng
    25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 199 - +
  • [45] GUIDELINES FOR ETHICAL NUDGING IN PASSWORD AUTHENTICATION
    Renaud, Karen
    Zimmermann, Verena
    SAIEE AFRICA RESEARCH JOURNAL, 2018, 109 (02): : 102 - 118
  • [46] A New Threshold Password Authentication Scheme
    Lee, Yung-Cheng
    SMART MATERIALS AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2011, 143-144 : 915 - 919
  • [47] Verifying and fixing Password Authentication Protocol
    Ma, Xiaoqi
    McCrindle, Rachel
    Cheng, Xiaochun
    SNPD 2006: SEVENTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 324 - +
  • [48] ADVANCED AUTHENTICATION & PASSWORD RESET MANAGER
    Bamnodkar, P. A.
    Sawant, H. K.
    Garje, G. V.
    Kulkarni, Pankaj
    ICCNT 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND NETWORK TECHNOLOGY, 2010, : 187 - +
  • [50] Cryptanalysis of an Efficient Password Authentication Scheme
    Pan, Chiu-Shu
    Tsai, Cheng-Yi
    Tsaur, Shyh-Chang
    Hwang, Min-Shiang
    2016 3RD INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2016, : 743 - 748