Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ku, Wei-Chi | en_US |
dc.contributor.author | Lee, Hui-Lung | en_US |
dc.date.accessioned | 2014-12-08T15:16:42Z | - |
dc.date.available | 2014-12-08T15:16:42Z | - |
dc.date.issued | 2006-05-01 | en_US |
dc.identifier.issn | 1016-2364 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/12314 | - |
dc.description.abstract | In 1999, Hoover and Kausik introduced a software token using the cryptographic camouflage technique and claimed that it can resist various on-line and off-line guessing attacks. Later, Kwon presented an authentication protocol based on the cryptographic camouflage technique and DSA, and pointed out that this initial protocol is vulnerable to an impersonation attack once a server's secret key or private key is compromised. Then, Kwon proposed a modified version that can resist such an impersonation attack by cryptographically embedding the recipient's identity in the user's signature to ensure that only the intended recipient will accept this signature. However, we find that Kwon's modified protocol still has some drawbacks. In this paper, we first demonstrate the drawbacks of Kwon's modified protocol and then propose an improved authentication protocol based on the cryptographic camouflage technique and RSA. Finally, we show that our improved protocol can provide prefect forward secrecy and can resist the off-line guessing attack, the impersonation attack, the replay attack, and the Denning-Sacco attack. Furthermore, the resistance of our improved protocol to the modification attack is also enhanced by additionally using credit-card sized CD-ROMs. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | password | en_US |
dc.subject | authentication | en_US |
dc.subject | software token | en_US |
dc.subject | cryptographic camouflage | en_US |
dc.subject | guessing attack | en_US |
dc.title | Authentication protocols using Hoover-Kausik's software token | en_US |
dc.type | Article | en_US |
dc.identifier.journal | JOURNAL OF INFORMATION SCIENCE AND ENGINEERING | en_US |
dc.citation.volume | 22 | en_US |
dc.citation.issue | 3 | en_US |
dc.citation.spage | 691 | en_US |
dc.citation.epage | 699 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000237907900015 | - |
dc.citation.woscount | 1 | - |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.