A password authentication scheme with secure password updating SEC 期末報告 學號: 姓名:翁玉芬
Source Chun-Li Lin and Tzonelih Hwang, Computers & Security, Vol.22, No.1, pp , 2003
Outline Introduction Peryravian-Zunic’s Scheme Hwang-Yen’s Scheme Proposed Scheme Conclusions
Introduction Password scheme Password authentication protocol replay attack password search attack stolen-verifier attack Password change protocol denial of service attack Key distribution forward secrecy Peyarian -Zunic Hwang -Yen Proposed scheme Password authentication Yes Password change Yes Key distribution Yes
Introduction (cont.) Notations id: user number pw: password K s : the server public key {M}K s : Encryption of M with K s rc: random number generated by client rs: random number generated by server H(.) : one-way hash function
Peyarian-Zunic’s Scheme – password transmission ClientServer id, rc rs id, H( H( id, pw), rc, rs) Access granted or denied. stolen-verifier attack
Peyarian-Zunic’s Scheme – password change ClientServer id, rc rs Access granted or denied id, H( H( id, pw), rc, rs), denial of service attack
Hwang-Yen’s Scheme –password transmission ClientServer id, { rc, pw}K s id, H (rc, rs) Access granted or denied, H ( rs)
Hwang-Yen’s Scheme -Key distribution ClientServer id, { rc, pw}K s receive rc generate rc generate rs, H ( rs) receive rs id, H (rc, rs) Access granted or denied Compute H (rc,rs) Compute H (rc,rs) one-time token No forward secrecy
Hwang-Yen’s Scheme -password change ClientServer id, { rc, pw}K s Access granted or denied, H( rs) id, H(rc, rs), denial of service attack
Proposed Scheme –password change ClientServer id, { rc, pw}K s Access granted or denied, H( rs) id, H(rc, rs), H( H( new_pw), rs)
Proposed Scheme –key distribution ClientServer generate x generate y id, Receive receive Access granted or denied id, Compute
Conclusions The password change protocol can protest against denial of service attack The key distribution protocol can propose forward secrecy