...
首页> 外文期刊>IEICE Transactions on fundamentals of electronics, communications & computer sciences >Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
【24h】

Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

机译:针对APOP,SIP和摘要式身份验证的扩展密码恢复攻击

获取原文
获取原文并翻译 | 示例
           

摘要

In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.
机译:在本文中,我们提出了针对挑战响应身份验证协议的密码恢复攻击。我们的攻击针对IEICE 2008中提出的MD5冲突攻击使用了消息差异。首先,我们展示如何有效地找到与上述消息差异相冲突的消息对。其次,我们证明了可以实际恢复在经过身份验证的邮局协议(APOP)中使用的密码。我们还表明,密码恢复攻击可以应用于会话发起协议(SIP)和摘要身份验证。我们的攻击可以在很短的时间内恢复多达前31个密码字符,并且比朴素的搜索方法快达第60个字符。我们已经实施了攻击,并确认可以成功恢复31个字符。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号