首页> 外文期刊>IEEE systems journal >Comments on “Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC”
【24h】

Comments on “Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC”

机译:评论“内部攻击保护:使用ECC基于轻量级密码的身份验证技术”

获取原文
获取原文并翻译 | 示例
           

摘要

The radical progress in web services has drained more attraction towards escalating the security of several applications that serve and interact with the Internet users. In order to get authenticated from servers, the users must disclose their secret information to the server such as password and username so that they can access distinct applications on the Web. Due to distinct security attacks, such secret credentials should be discouraged from being revealed. Moreover, it is vibrant to secure the systems from known attacks. In contrast to all known security attacks, the insider attack is considered devastating because the privileged insiders of a system can violate the secret credentials, which may lead towards irrecoverable damage to both the system and the user. Therefore, to ensure the security of the system from insider attacks, different protocols have been proposed. Very recently, Rajamanickam et al. "Insider attack protection: Lightweight password-based authentication techniques using ECC," presented novel authentication scheme for insider attack protection. They claimed that their protocol not only prevents insider attack but it is also immune to several known security attacks. This comment discloses the non-trivial weaknesses in the authentication phase between client and server. We have identified that the adversary can successfully impersonate the entities communicating with each other through this protocol. Moreover, their protocol fails to offer forward and backward secrecy. Consequently, we suggest possible solution for attack resilience.
机译:Web服务中的激进进度已经耗尽了更多的吸引力,以升级提供服务和与互联网用户互动的多个应用程序的安全性。为了从服务器获得身份验证,用户必须将其秘密信息披露给服务器,如密码和用户名,以便他们可以访问Web上的不同应用程序。由于安全攻击明显,应忽视这种秘密凭据。此外,将系统从已知攻击确保系统充满活力。与所有已知的安全攻击相比,内部内部攻击被认为是毁灭性的,因为系统的特权内部人员可以违反秘密凭证,这可能导致对系统和用户的损坏不可恢复。因此,为了确保系统的安全性来自内幕攻击,已经提出了不同的协议。最近,Rajamanickam等。 “内幕攻击保护:使用ECC的轻量级密码认证技术,”为内幕攻击保护呈现了新型认证方案。他们声称他们的协议不仅可以防止内幕攻击,但它也不会对几种已知的安全攻击免疫。此评论披露了客户端和服务器之间的认证阶段中的非平凡弱点。我们已经确定了对手可以通过本协议成功模拟与对方通信的实体。此外,他们的议定书未能向前和后向保密。因此,我们建议采取攻击弹性的可能解决方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号