Modular design for round-oriented password authentication protocols

Chi Chao Chang, Tzonelih Hwang

研究成果: Article同行評審

1 引文 斯高帕斯(Scopus)

摘要

Password authentication has always been a natural choice for remote access in network applications. Although there have been many protocols of this kind exists today, few have seriously taken into account and exploited the duplex nature of modern communication networks. Given the capability to send and receive messages at the same time, it would be inefficient in terms of communication and computation resources for participants to wait for responses while doing nothing. There have also been a number of researches focus on parallelization of computations in step-oriented protocols. However, these protocols are often highly integrated and no modification is considered secure without rigorously analyzing them again. Thus, system designers who have restrictions and policies set for by their institutions may find that incorporating these protocols a dreadful task. In this paper, we seek to identify the functional modules in password authentication schemes and give a general procedure for generating protocols with these modules. We also give a proof of security for the generalized protocol produced from the procedure. With modular and round-oriented design, we show that flexible infrastructure can be built to provide sound solutions to password authentication in a wide range of hardware/software implementations and computing capabilities.

原文English
頁(從 - 到)1295-1308
頁數14
期刊Journal of Information Science and Engineering
22
發行號5
出版狀態Published - 2006 9月 1

All Science Journal Classification (ASJC) codes

  • 軟體
  • 人機介面
  • 硬體和架構
  • 圖書館與資訊科學
  • 計算機理論與數學

指紋

深入研究「Modular design for round-oriented password authentication protocols」主題。共同形成了獨特的指紋。

引用此