![]() “Announcing Our Worst Passwords of2015,”, 2015. Lecture Notes in Computer Science, vol.5037, 2008, pp. “Multi-Factor Authenticated Key Exchange,” in ANCS, ser. “Two Factor Authenticated Key Exchange (TAKE) Protocol in Public Wireless LANs,” in IEICE Transon Communications, vol. “Three-Factor Control Protocol Based on Elliptic Curve Cryptosystem for UniversalSerial Bus Mass Storage Devices,” IET, vol. “Two Efficient Two-Factor Authenticated Key Exchange Protocols in Public Wireless LANs,” Computers &Electrical Engineering, vol. and Xu,L.“Robust Multi-Factor Authentication for Fragile Communications,” IEEETransactions on Dependable and Secure Computing, vol. “Enhanced Three-Factor Security Protocol for Consumer USB Mass Storage Devices,” IEEE Transactions on Consumer Electronics, vol. “A New Framework for Efficient Password-Based Authenticated Key Exchange,” in ACM CCS, 2010, pp. “Session-key generation using human passwords only,” in CRYPTO, 2001, pp. “A Framework for Password-based Authenticated Key Exchange,” ACM Transactions on Informationand System Security, vol. “Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman,” in EUROCRYPT, 2000, pp. “Augmented Encrypted Key Exchange: A Password based protocol secure against dictionaryattacks and Password File Compromise,” in ACM CCS, 1993, pp.244–250. “Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks,” in IEEE S&P, 1992, pp. “Authenticated Key Exchange Secure Against Dictionary Attacks,” in EUROCRYPT,ser. “Fuzzy Extractors for Minutiae-Based Fingerprint Authentication,” in ICB, ser. The theoretic comparisons and the experimental results show that this scheme achieves both security and usability operating conditions is demonstrated through simulation results using MATLAB/Simulink followed by an experimental validation. It also implements our proposed method as textual, graphical, biometric and device password to access the user accounts. It defines the security model and gives the according to security analysis. It proposes a very efficient MFAKE protocol. To summarize, the existing multi-factor protocols did not provide enough security and efficiency simultaneously. An inevitable by-product arises that the usability of the protocol often drops greatly. Casually designed schemes, security is even weakened in the sense that leakage of one authentication factor will defeat the whole MFAKE protocol. combining passwords, biometrics and device simultaneously. Higher security concerns call for MFAKE schemes, e.g. Single-factor AKE is widely used in practice. Authenticated key exchange is one of the most important applications in applied cryptography, the user interacts with a server to set up a session key to pre-registered information, authentication factor, like password or biometrics of the user is stored.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |