270 likes | 384 Views
A New Two-Server Approach for Authentication with Short Secrets. John Brainard, Ari Juels,Burt Kaliski and Michael Szydlo RSA Laboratories. To appear in USENIX Security 2003/4/9. Outline. Introduction Previous Work New Work. Passwords and PINs. Short secrets are convenience .
E N D
A New Two-Server Approach for Authentication with Short Secrets John Brainard, Ari Juels,Burt Kaliski and Michael Szydlo RSA Laboratories To appear in USENIX Security 2003/4/9
Outline • Introduction • Previous Work • New Work
Passwords and PINs • Short secrets are convenience . • The secrets stored in a central database.
Problem • How is it possible to provide secure services to users who can authenticate using only short secrets or weak password?
Smartcards , similar key-storage • Memorable PW – guessing attack
SPAKA protocols • (Secure password authenticated key agreement) • EKE:Share a password, mutual ensure to established a session key.
Attack to SPAKA Client SERVER LOOK ALL ? Cleartext celartext password steal Off-line dictionary attacks
Outline • Introduction • Previous Work • New Work
Previous work • A mechanism called password hardening , by Ford and Kaliski. Client password Server secret …
Learn no information … Decrypt credentials Authenticate Others protocols…
Outline • Introduction • Previous Work • New Work
Now new work • Two-server solution . p Client P’ SSL SSL SSL Server Red Server Blue P = P’ ??
Outline • Introduction • Previous Work • New Work • Equality-Testing Protocol
Equality-Testing Protocol • H is a large group(160-bit) and + be the group operator • f is collision-free hash function
Equality-Testing Protocol • Registration:
Equality-Testing Protocol • Authentication: If P = P’ 0
G is large group (hard to discrete log) g : generator q : order in Zp (p=2q+1) p (1024 bits) w: H -> G
Compare with SPAKA • Mutually authenticated channel between two servers. • not derive a shared key. • Client need perform no cryptographic computation, and operation in H.
Outline • Introduction • Previous Work • New Work • Equality-Testing Protocol • Architectural Motivation
Architectural Motivation • Security in two servers. * different OSs * different organizations (privacy outsourcing): service provider privacy provider
Architectural Motivation • Universality • Pseudonymity • Engineering simplicity • System isolation • Mitigation of denial-of-service attacks
Outline • Introduction • Previous Work • New Work • Equality-Testing Protocol • Architectural Motivation • Avoiding Problems
Avoiding Problems • False Pseudonym Problem • Replay Attacks Problem