抵抗恶意服务器的口令增强加密方案

Journal Article (2023)
Author(s)

Yi Zhao (Chang'an University)

Hang Liu (Chang'an University)

Kaitai Liang (TU Delft - Cyber Security)

Yang Ming (Chang'an University)

Xiang Zhao (Chang'an University)

Bo Yang (Shaanxi Normal University)

Research Group
Cyber Security
DOI related publication
https://doi.org/10.13328/j.cnki.jos.006440
More Info
expand_more
Publication Year
2023
Language
Chinese
Research Group
Cyber Security
Bibliographical Note
Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public. @en
Issue number
5
Volume number
34
Pages (from-to)
2482-2493
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Password hardening encryption (PHE) is an emerging primitive in recent years. It can resist offline attack brought by keyword guessing attack from server via adding a third party with crypto services joining the decryption process. This primitive enhances the password authentication protocol and adds encryption functionality. This paper presents an active attack from server in the first scheme that introduced this primitive. This attack combines the idea from a cutting-edge threat called algorithm substitution attack which is undetectable and makes the server capable of launching offline attack. This result shows that the original PHE scheme can not resist attacks from malicious server. Then this study tries to summarize the property that an algorithm substitution attack resistant scheme should have. After that this paper presents a PHE scheme that can resist such kind of attacks from malicious server with simulation results. Finally, this study concludes the result and gives some expectation for future systematic research on interactive protocols under algorithm substitution attack.

Files

6440.pdf
(pdf | 8.75 Mb)
- Embargo expired in 22-08-2024
License info not available