Title :
Using smart cards to authenticate passwords
Author :
Chang, Chin-Chen ; Hwang, Ren-Junn ; Buehrer, Daniel J.
Author_Institution :
Inst. of Comput. Sci. & Inf. Eng., Nat. Chung Cheng Univ., Chia Yi, Taiwan
Abstract :
A password authentication scheme which can verify remote passwords without the use of a verification table is presented. Each user possesses a smart card which is used for login and authentication, as introduced by A. Shamir (1985). During the login, the user types in his identity and the password associated with his smart card, along with the identity of the other user with whom he wishes to communicate. The smartcard uses a signature scheme to check whether or not the login can be accepted. As well as modifying Shamir´s algorithm for the signature scheme checking by using a theorem about relatively prime numbers, one also adds communication timestamps to prevent replaying of a previously intercepted login request
Keywords :
access control; message authentication; smart cards; Shamir´s algorithm; password authentication; prime numbers; signature scheme; smart cards; Access control; Data security;
Conference_Titel :
Security Technology, 1993. Security Technology, Proceedings. Institute of Electrical and Electronics Engineers 1993 International Carnahan Conference on
Conference_Location :
Ottawa, Ont.
Print_ISBN :
0-7803-1479-4
DOI :
10.1109/CCST.1993.386808