DocumentCode :
3377361
Title :
Complementary Scheme of Remote User Access over Insecure Networks
Author :
Jang, Injoo ; Yoo, Hyeong Seon
Author_Institution :
Sch. of Comput. Sci. & Eng., Inha Univ., Incheon, South Korea
fYear :
2009
fDate :
20-22 Dec. 2009
Firstpage :
1
Lastpage :
4
Abstract :
Password authentication over unreliable networks is the most popular method in the Internet and mobile communication environments. Lately, Peyravian and Jeffries proposed the password-based remote user authentication protocol, password change, and session key establishment over insecure networks without requiring and any additional private-key or public-key infrastructure. However, Peyravian-Jeffries´s protocols have the security flaws against off-line password guessing attacks and DOS attacks. In this paper we suggest a complementary protocol to solve the security flaws of Peyravian-Jeffries´s protocol.
Keywords :
Internet; cryptographic protocols; mobile computing; private key cryptography; public key cryptography; DOS attacks; Internet; Peyravian-Jeffries protocols; complementary protocol; complementary scheme; insecure networks; mobile communication; offline password guessing attacks; password authentication; password change; password-based remote user authentication protocol; private-key infrastructure; public-key infrastructure; remote user access; security flaws; session key establishment; Access protocols; Authentication; Computer crime; Computer science; Cryptography; DH-HEMTs; IP networks; Mobile communication; Protection; Public key;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Ubiquitous Information Technologies & Applications, 2009. ICUT '09. Proceedings of the 4th International Conference on
Conference_Location :
Fukuoka
ISSN :
1976-0035
Print_ISBN :
978-1-4244-5131-9
Type :
conf
DOI :
10.1109/ICUT.2009.5405752
Filename :
5405752
Link To Document :
بازگشت