1995
DOI: 10.1145/219282.219298
|View full text |Cite
|
Sign up to set email alerts
|

Undetectable on-line password guessing attacks

Abstract: Several 3-party-based authentication protocols have been proposed, which are resistant to off-line password guessing attacks. We show that they are not resistant to a new type of attack called "undetectable on-line password guessing attack". The authentication server is not able to notice this kind of attack from the clients' (attacker's) requests, because they don't include enough information about the clients (or attacker). Either freshness or authenticity of these requests is not guaranteed. Thus the authen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
129
0
1

Year Published

2009
2009
2015
2015

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 226 publications
(130 citation statements)
references
References 7 publications
0
129
0
1
Order By: Relevance
“…Unfortunately, users prefer usability, thus choosing memorable passwords that are easy to recall [12], but easy to recover with dictionary attacks [15]. The proliferation of smartphones made other authentication mechanisms popular, e.g.…”
Section: Related Workmentioning
confidence: 99%
“…Unfortunately, users prefer usability, thus choosing memorable passwords that are easy to recall [12], but easy to recover with dictionary attacks [15]. The proliferation of smartphones made other authentication mechanisms popular, e.g.…”
Section: Related Workmentioning
confidence: 99%
“…As it is simple for the users to remember the passwords, password based key exchange protocol achieved greater attention. Even though the protocol is simple and efficient, according to Ding and Horster [2], it should not be vulnerable to any type of off line, undetectable or detectable on line password guessing attacks, since the passwords are of low-entropy. In general the password guessing attacks can be divided into three classes and they are listed below:…”
Section: Introductionmentioning
confidence: 99%
“…From this point of view, PAKE provides convenience and mobility. Password-based authenticated key exchange protocols, however, are vulnerable to password guessing attacks [3] since users usually choose easy-to-remember passwords. Unlike typical private keys, the password has limited entropy, and is constrained by the memory of the user.…”
Section: Introductionmentioning
confidence: 99%