首页> 外文会议>International Symposium on ELectronic Commerce and Security >Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack
【24h】

Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack

机译:基于秘密关键的身份验证协议防止盗窃秘密攻击

获取原文

摘要

The security of a two-party authentication protocol relies on the stored secrets of each entity are not easily compromised by adversaries. However, in the real world, hackers can always divulge the stored secrets. In this paper, we introduce the concept of the stolen-secret attack and point out that all existing secret-key based authentication protocols and password based authentication protocols suffer from this attack. We also propose two methods that defend against the stolen-secret attack. Security proof and implementation analysis are given for both methods to illustrate their soundness and usefulness.
机译:双方认证协议的安全性依赖于每个实体的存储秘密,不容易受到对手的影响。然而,在现实世界中,黑客总是可以泄露存放的秘密。在本文中,我们介绍了被盗秘密攻击的概念,并指出所有现有的基于秘密关键的身份验证协议和基于密码的身份验证协议遭受此攻击。我们还提出了两种抵御被盗秘密攻击的方法。对于两种方法,给出了安全证明和实现分析来说明他们的声音和有用性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号