首页> 外文会议>International conference on cryptology in Africa >Software-Only Two-Factor Authentication Secure Against Active Servers
【24h】

Software-Only Two-Factor Authentication Secure Against Active Servers

机译:仅软件的两方面身份验证可确保对活动服务器的安全

获取原文

摘要

In most password-based authentication protocols, the server owns a value, the so-called verifier, that depends on the registered password. This verifier is often a one-way function of the password. Despite this protection, an unauthorized person who gets access to the verifier can mount a brute-force attack to recover the password. If the entropy of the password is low, which is often the case in practice, such an attack might be successful. Motivated by the growing need to face databases compromises, we propose a two-factor password-based authentication protocol where no information about the password leak from the server's side nor from the client's side, and where the password is not sent to the server when the user authenticates. During the registration, a user gets a value, called the token, while the server records the verifier. Our security model ensures that brute-force attacks are impossible if the server is compromised. Moreover, only on-line attempts are possible if a token is stolen. The solutions that we describe fit well into scenarios where the token is stored on a mobile phone. We provide constructions, proven secure in the random-oracle model, under standard assumptions.
机译:在大多数基于密码的身份验证协议中,服务器拥有一个值,即所谓的验证程序,该值取决于注册的密码。该验证程序通常是密码的单向功能。尽管有这种保护,但未经授权的访问验证者的人可以发起暴力攻击来恢复密码。如果密码的熵很低(通常在实践中是这种情况),则这种攻击可能会成功。由于面对数据库妥协的需求不断增长,我们提出了一种基于两因素的基于密码的身份验证协议,该协议中没有关于从服务器端或客户端泄漏密码的信息,并且当密码泄露时不会将密码发送给服务器。用户验证。在注册期间,用户获取一个称为令牌的值,而服务器记录验证者。我们的安全模型可确保如果服务器受到威胁,则不可能进行暴力攻击。此外,如果令牌被盗,则只能进行在线尝试。我们描述的解决方案非常适合令牌存储在手机中的场景。在标准假设下,我们提供在随机预言模型中证明是安全的构造。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号