• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Liu, Fanbao (Liu, Fanbao.) | Chen, Yasha (Chen, Yasha.) | Dong, Yuan (Dong, Yuan.)

收录:

EI Scopus

摘要:

Hash-based challenge-and-response protocols are widely used as an authentication scheme in network applications. The authenticator sends a random string as a challenge to the peer, the peer generates a response with a hash function on a pre-shared password combined the received challenge. In this paper, we propose a general and efficient way to break some prevalent hash-based challenge- and-response protocols in use. These protocols are vulnerable to the chosen challenge attack launched by a malicious user, who impersonates the server. We first generate a rainbow table containing hash values of all possible passwords, which is produced by hashing a pre-chosen challenge concatenated with all possible password candidates. Second, we impersonate the authenticator and send the pre-chosen challenge to the peer. Finally, we look up in the rainbow table for the received response from the peer to crack the password. With this tactic, we can do the cost consuming pre-computation once, and then we can always use it to recover all of the peer's passwords with only one additional on-line query. © 2012 IEEE.

关键词:

Authentication Hash functions

作者机构:

  • [ 1 ] [Liu, Fanbao]School of Computer, National University of Defense Technology, Changsha, 410073, Hunan, China
  • [ 2 ] [Liu, Fanbao]School of Computer, Beijing University of Technology, 100124, Beijing, China
  • [ 3 ] [Chen, Yasha]School of Computer, Beijing University of Technology, 100124, Beijing, China
  • [ 4 ] [Dong, Yuan]Naval Meteorology and Oceanography Center, 100000, Beijing, China

通讯作者信息:

电子邮件地址:

查看成果更多字段

相关关键词:

相关文章:

来源 :

年份: 2012

页码: 59-62

语种: 英文

被引次数:

WoS核心集被引频次: 0

SCOPUS被引频次:

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 2

在线人数/总访问数:690/2896702
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司