Skip to main content

User Authentication Protocol Based on Human Memorable Password and Using ECC

  • Conference paper
Grid and Cooperative Computing (GCC 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3032))

Included in the following conference series:

Abstract

This paper introduces an authentication protocol secure against off-line dictionary attacks and server compromise while processing human memorable password. The protocol uses the fact that there are huge numbers of candidates that can be used to represent a password, even if the password is memorable by humans. The protocol uses ECC to encrypt a value representing a password, but the prover has no need to store a server’s public key.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bellare, M., Pointcheaval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139–155. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  2. Bellovin, S.M., Merrit, M.: Augmented encrypted key exchange: Password-based protocol secure against dictionary attack and password file compromise. In: ACM Security (CCS 1993), pp. 244–250 (1993)

    Google Scholar 

  3. Bellovin, S.M., Merrit, M.: Encrypted key exchange: Password-based protocols secure against dictionary attack. In: Proceedings of IEEE Security and Privacy, pp. 72–84 (1992)

    Google Scholar 

  4. Boyko, V., MacKenzie, P.D., Patel, S.: Provably secure password authenticated key exchange using Diffie-Hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 156–171. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  5. Gong, L.: Optimal authentication protocols resistant to password guessing attacks. In: 8th IEEE Computer Security Foundations Workshop, pp. 24–29 (1995)

    Google Scholar 

  6. Gong, L., Lomas, T.M.A., Needham, R.M., Saltzer, J.H.: Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications 11(5), 648–656 (1993)

    Article  Google Scholar 

  7. Halevi, S., Krawczyk, H.: Public-key cryptography and password protocols. In: ACM Security (CCS 1998), pp. 122–131 (1998)

    Google Scholar 

  8. ISO/IEC 9798-4.: Information technology-Security techniques-Entity authentication-Part 4: Mechanisms using a cryptographic check function. International Organization for Standardization, Geneva, Switzerland (1995)

    Google Scholar 

  9. Jablon, D.: Strong password-only authenticated key exchange. ACM Computer Communication Review, ACM SIGCOMM 26(5), 5–20 (1996)

    Article  Google Scholar 

  10. Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24, 770–772 (1981)

    Article  Google Scholar 

  11. Morris, R., Thompson, K.: Password security: a case history. Communications of the ACM 22, 594–597 (1979)

    Article  Google Scholar 

  12. Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, S.B., Kang, M.S., Lee, S.J. (2004). User Authentication Protocol Based on Human Memorable Password and Using ECC. In: Li, M., Sun, XH., Deng, Qn., Ni, J. (eds) Grid and Cooperative Computing. GCC 2003. Lecture Notes in Computer Science, vol 3032. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24679-4_188

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24679-4_188

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-21988-0

  • Online ISBN: 978-3-540-24679-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics