Further observations on smart-card-based password-authenticated key agreement in distributed systems


Autoria(s): Huang,X; Chen,X; Li,J; Xiang,Y; Xu,L
Data(s)

01/07/2014

Resumo

This paper initiates the study of two specific security threats on smart-card-based password authentication in distributed systems. Smart-card-based password authentication is one of the most commonly used security mechanisms to determine the identity of a remote client, who must hold a valid smart card and the corresponding password to carry out a successful authentication with the server. The authentication is usually integrated with a key establishment protocol and yields smart-card-based password-authenticated key agreement. Using two recently proposed protocols as case studies, we demonstrate two new types of adversaries with smart card: 1) adversaries with pre-computed data stored in the smart card, and 2) adversaries with different data (with respect to different time slots) stored in the smart card. These threats, though realistic in distributed systems, have never been studied in the literature. In addition to point out the vulnerabilities, we propose the countermeasures to thwart the security threats and secure the protocols. © 2013 IEEE.

Identificador

http://hdl.handle.net/10536/DRO/DU:30067737

Idioma(s)

eng

Publicador

IEEE Computer Society

Relação

http://dro.deakin.edu.au/eserv/DU:30067737/huang-futherobservations-2014.pdf

http://www.dx.doi.org/10.1109/TPDS.2013.230

Direitos

2014, IEEE

Palavras-Chave #Authentication #key exchange #offline-dictionary attack #online-dictionary attack #smart card #Science & Technology #Technology #Computer Science, Theory & Methods #Engineering, Electrical & Electronic #Computer Science #Engineering #USER AUTHENTICATION #REMOTE AUTHENTICATION #SECURITY ENHANCEMENT #SCHEME #EFFICIENT #IMPROVEMENT #ROBUST
Tipo

Journal Article