An Improved Optimal Strong-Password Authentication (I-OSPA) Protocol Secure Against Stolen-Verifier Attack and Impersonation Attack


The KIPS Transactions:PartC, Vol. 11, No. 4, pp. 439-446, Aug. 2004
10.3745/KIPSTC.2004.11.4.439,   PDF Download:

Abstract

In the Internet, user authentication is the most important service in secure communications. Although password-based mechanism is the most widely used method of the user authentication in the network, people are used to choose easy-to-remember passwords, and thus suffers from some innate weaknesses. Therefore, using a memorable password is vulnerable to the dictionary attacks. The techniques used to prevent dictionary attacks bring about a heavy computational workload. In this paper, we describe a recent solution, the Optimal Strong-Password Authentication (OSPA) protocol, and that it is vulnerable to the stolen-verifier attack and an impersonation attack. Then, we propose an Improved Optimal Strong-Password Authentication (I-OSPA) protocol, which is secure against stolen-verifier attack and impersonation attack. Also, since the cryptographic operations are computed by the processor in the smart card, the proposed I-OSPA needs relatively low computational workload and communicational workload for user.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
J. Kwak, S. H. Oh, H. K. Yang, D. H. Won, "An Improved Optimal Strong-Password Authentication (I-OSPA) Protocol Secure Against Stolen-Verifier Attack and Impersonation Attack," The KIPS Transactions:PartC, vol. 11, no. 4, pp. 439-446, 2004. DOI: 10.3745/KIPSTC.2004.11.4.439.

[ACM Style]
Jin Kwak, Soo Hyun Oh, Hyung Kyu Yang, and Dong Ho Won. 2004. An Improved Optimal Strong-Password Authentication (I-OSPA) Protocol Secure Against Stolen-Verifier Attack and Impersonation Attack. The KIPS Transactions:PartC, 11, 4, (2004), 439-446. DOI: 10.3745/KIPSTC.2004.11.4.439.