Abstract
A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system. The method assumes a secure one-way encryption function and can be implemented with a microcomputer in the user's terminal.
- 1 Diffie, W., and Hellman, M.E. New directions in cryptography. IEEE Trans. Inform. Theory 1T-22 (Nov. 1976), 644-654.Google ScholarDigital Library
- 2 Evans, A., Kantrowitz, W., and Weiss, E. A user authentication scheme not requiring secrecy in the computer. Comm. A CM 17, 8 (Aug. 1974), 437-442. Google ScholarDigital Library
- 3 Wilkes, M.V. Time-Sharing Computer Systems. American Elsevier, New York, 1972. Google ScholarDigital Library
Index Terms
- Password authentication with insecure communication
Recommendations
Analysis of Kim-Jeon-Yoo Password Authentication Schemes
Password authentication is a type of authentication protocol for communications over an insecure network. Recently, Kim, Jeon, and Yoo gave an improvement of Yang-Shieh password authentication schemes to resist an existing forgery attack. However, in ...
Improvement of the Peyravian-Jeffries's user authentication protocol and password change protocol
Remote authentication of users supported by passwords is a broadly adopted method of authentication within insecure network environments. Such protocols typically rely on pre-established secure cryptographic keys or public key infrastructure. Recently, ...
A Secure Strong-Password Authentication Protocol
Password authentication, which is widely used for authenticated method, also is important protocol by requiring a username and password before being allowed access to resources. In 2001, Lin et al. proposed the optimal strong-password authentication ...
Comments