180 likes | 379 Views
On the Limits of Anonymous Password Authentication - 对 口令验证弱点的分析. Yanjiang Yang ( 杨艳江 ) I2R, Singapore. Jian Weng ( 翁健 ) Jinan Univ. China. Feng Bao ( 鲍丰 ) I2R, Singapore. Content. Introduction Related Work Limits of Anonymous Password Authentication
E N D
On the Limits of Anonymous PasswordAuthentication -对口令验证弱点的分析 Yanjiang Yang (杨艳江) I2R, Singapore Jian Weng (翁健) Jinan Univ. China Feng Bao (鲍丰) I2R, Singapore
Content • Introduction • Related Work • Limits of Anonymous Password Authentication • Conclusion
Introduction • Related Work • Limits of Anonymous Password Authentication • Conclusion
Password Authentication: Pros & Cons • Password Authentication (口令验证): Most widely used authentication Technique • Advantages • Portability • Disadvantages • Guessing attacks (online, offline)
Privacy Concern • Privacy is increasingly a concern • Password authentication in its original form does not protect user privacy
Standard Setting Project Summary - why should it be done? User Server Password File U1, PW1 U2, PW2 U3, PW3 Ui PWi PWi Ui, PWi Un, PWn
Add Anonymity – Anonymous Password Auth. • Unlinkability U1, PW1 U2, PW2 U3, PW3 Ui, PWi Unlinkability Un, PWn
Project Summary - why should it be done? • Introduction • Related Work • Limits of Anonymous Password Authentication • Conclusion
Project Summary - why should it be done? • D. Q. Viet, A. Yamamura, T. Hidema. Anonymous Password-Based Authenticated Key Exchange. Proc. Indocrypt 2005, LNCS 3797, pp. 233-257, 2005. • S. Shin, K. Kobara, and H. Imai. A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange, IEICE Transactions on Fundamentals, Vol. E91-A, No. 11, pp. 3312-3323, 2008. • M. Abdalla, M. Izabachene, and D. Pointcheval. Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange, Proc. International Conference on Cryptology and Network Security, CANS'08, pp. 133-148, 2008. • J. Yang, and Z. Zhang. A New Anonymous Password-Based Authenticated Key Exchange Protocol, Proc. Indocrypt 2008, pp. 200-212, 2008.
Yang-Zhang Scheme Project Summary - why should it be done?
Undetectable Online Guessing Attack Project Summary - why should it be done? No Authentication of user by the server
Project Summary - why should it be done? • Introduction • Related Work • Limits of Anonymous Password Authentication • Conclusion
Limit 1: Server Computation O(n) Project Summary - why should it be done?
Limit 2: Online Guessing Attack Project Summary - why should it be done? • The Server Does not Know the Victim User • Asking Users to Frequently Update Their Passwords Cannot Solve the Problem
Introduction • Related Work • Limits of Anonymous Password Authentication • Conclusion
Anonymous password authentication should be a user tool • But anonymous password authentication has inherent weaknesses
Q & A Project Summary - why should it be done? THANK YOU!