Password Authentication Schemes: Current Status and Key Issues

作者: Cheng-Chi Lee , Min-Shiang Hwang , Chwei-Shyong Tsai

DOI: 10.6633/IJNS.200609.3(2).01

关键词:

摘要: Password authentication is one of the simplest and most convenient mechanisms to deal with secret data over insecure networks. It more frequently required in areas such as computer networks, wireless remote login systems, operation database management systems. In this paper, we shall present result our survey through all currently available password-authentication-related schemes get them classified terms several crucial criteria. To be critical, existing are vulnerable various attacks fail serve purposes an ideal password scheme should. order see how different compare situations, define possible goals that should withstand achieve. We hope offer here can also help future researchers develop better schemes.

参考文章(44)
Yen Sung-Ming, Liao Kuo-Hong, Shared authentication token secure against replay and weak key attacks Information Processing Letters. ,vol. 62, pp. 77- 80 ,(1997) , 10.1016/S0020-0190(97)00046-X
Tzong-Chen Wu, Research: Remote login authentication scheme based on a geometric approach Computer Communications. ,vol. 18, pp. 959- 963 ,(1995) , 10.1016/0140-3664(96)81595-7
Wei-Chi Ku, Chien-Ming Chen, Stolen-Verifier Attack on Two New Strong-Password Authentication Protocols IEICE Transactions on Communications. pp. 2519- 2521 ,(2002)
Hung-Min Sun, Her-Tyan Yeh, Further cryptanalysis of a password authentication scheme with smart cards IEICE Transactions on Communications. ,vol. 86, pp. 1412- 1415 ,(2003)
Manjula Sandirigama, Matu-Tarow Noda, Akihiro Shimizu, Simple and Secure Password Authentication Protocol (SAS) IEICE Transactions on Communications. ,vol. 83, pp. 1363- 1365 ,(2000)
Hung-Min Sun, Tzonelih Hwang, Chun-Li Lin, Attacks and Solutions on Strong-Password Authentication IEICE Transactions on Communications. ,vol. 84, pp. 2622- 2627 ,(2001)
Wen-Her Yang, Shiuh-Pyng Shieh, Refereed paper: Password authentication schemes with smart cards Computers & Security. ,vol. 18, pp. 727- 733 ,(1999) , 10.1016/S0167-4048(99)80136-9
Bin Wang, Jian-Hua Li, Zhi-Peng Tong, Refereed Cryptanalysis of an enhanced timestamp-based password authentication scheme Computers & Security. ,vol. 22, pp. 643- 645 ,(2003) , 10.1016/S0167-4048(03)00713-2
Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang, A simple remote user authentication scheme Mathematical and Computer Modelling. ,vol. 36, pp. 103- 107 ,(2002) , 10.1016/S0895-7177(02)00106-1
Jinn-Ke Jan, Yu-Yii Chen, “Paramita wisdom” password authentication scheme without verification tables Journal of Systems and Software. ,vol. 42, pp. 45- 57 ,(1998) , 10.1016/S0164-1212(98)00006-5