Browse > Article

One-Pass Identification Processing Password  

Kim Yong-Hun (조선대학교)
Cho Beom-Joon (조선대학교)
Abstract
Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/ server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. It is the stability that is based on Square Root problem, and we would like to suggest OPI(One Pass Identification), enhancing the stability for all of the well-known attacks by now including Free-playing attack, off-line Literal attack, Server and so on. OPI does not need to create the special key to read the password. OPI is very excellent in identifying the approved person within a very short time.
Keywords
Identification; Pre-Play Attack; off-Line Dictionary Attack; Server Comprise;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Andreoni, and H. Varian, 'Pre-play Contracting in the Prisoners' Dilemma', mimeo, University of Wisconsin, 1999
2 Bao, F., R. Deng and W. Mao. Efficient and practical fair exchange protocols with off-line TTP. 1998 IEEE Symposium on Security and Privacy. Oakland, IEEE Compute Society. pp. 77-85. 1998
3 박종민, 김용훈, 조범준, '타인의 관찰에서 안전한 패스워드 시스템', 한국해양정보통신학회 논문지, 제8권 제8호, pp.1790-1795, 2004
4 Neil Haller. The s/key(tm) one-time password system. Symposium on Network and Distributed System Security, pp.151-157, February 1994
5 박중길, 장태주, 박봉주, 류재철, '시간을 이용한 효율적인 일회용 패스워드 알고리즘', 한국 정보처리학회 논문지, 제8-c권 제4호, pp.373-378, 2001
6 Bensaid, B. and R.J. Cary-Bobo, 'An Exact Formula for the Lion's Share: A Model of Pre-Play Negotiation,' Games and Economic Behavior, 14, pp.44-89, 1996   DOI   ScienceOn
7 E. Moulines, P. Duhamel, J.F. Cardoso, and S. Mayrargue, Subspace methods for the blind identification of multichannel fir filters, IEEE Transactions on Signal Processing, SP-43, pp. 516-525, 1995
8 양대헌, 이석준, '무선 인터넷을 위한 패스워드 기반의 인증 및 키 교환 프로토콜', 한국정보과학회 논문지, 제29권 제3호, pp.324-332, 2002
9 Neil Haller. The s/key(tm) one-time password system. In Proceedings of the 1994 Symposium on Network and Distributed System Security, pp.151-157, 1994
10 A. Hill, A. D. Brett, and C. J. Taylor, 'Automatic landmark identification using a new method of non-rigid correspondence' in Proceedings of IPMI '97 Conference, vol. 1230, pp. 483-488, 1997
11 A. W. Senior and A. J. Robinson. An off-line cursive handwriting recognition system. IEEE Transactions on Pattern Analysis and Machine Intelligence, 20(3) pp.309-321, 1998   DOI   ScienceOn