Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2003.10C.2.141

Secure Password System against Imposter  

Park, Sung-Bae (초당대학교 컴퓨터과학과)
Park, Seung-Bae (순천제일대학 인터넷정보학부)
Kang, Moon-Seol (광주대학교 컴퓨터전자통신공학부)
Abstract
We present a new password system, called dual password system, with the user verification procedure. Dual password system is the first password system in the world preventing the exposure of secret information to imposter at the terminal. User of dual password system matches two alphabets at same location of first password and second password iteratively for inputting password. Therefore, the deriving method of first password and second password from the password is important in dual password system. Related to the deriving method of first password and second password from password, a new problem, called dual password derivation problem, is defined, and the evaluation factors for the solutions of the dual password derivation problem are presented.
Keywords
Password System; Dual Password; Dual Password System; First Password; Second Password; Dual Password Derivation Problem;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Blum, A. De santis, S. Micali, and G. Persiano, Noninteractive zero-knowledge,' SIAM Journal on Computing, Vol.20, No.6, pp.1084-1118, 1991   DOI
2 D. C. Feldmeier and P. R. Karn, 'UNIX password security-ten years later,' Advances in Cryptology-CRYPTO '89, LNCS 435, pp.44-63, 1990
3 S. Goldwasser, S. Micali and C. Rachoff, 'The knowledge complexity of interactive proof systems,' SIAM Journal on Computing, pp.186-208, 1989   DOI   ScienceOn
4 A. Jain, L. Hong, and R. Bolle, 'On-line fingerprint verification,' IEEE Trans. Pattern Ana. Machine Intell., Vol.19, No.4, pp.302-313, 1997   DOI   ScienceOn
5 D. V. Klein, 'Foiling the cracker : a survey of, and improvements to, password security,' Proceedings of the 2nd USENIX UNIX Security Workshop, pp.5-14, 1990
6 Z. M. Kovcs-Vajna, 'A fingerprint verification system based on triangular matching and dynamic time warping,' IEEE Trans, Pattern Ana. Machine Intell., Vol.22, No.11, pp.1266-1276, 2000   DOI   ScienceOn
7 U. Feige, A. Fiat and A. Shamir, 'Zero knowledge proofs of identity,' Journal of Cryptology, pp.77-94, 1988   DOI
8 K.-Y. Lam and T. Beth, 'Timely authentication in distributed systems,' Second European Symposium on Research in Computer Security, LNCS 648, pp.293-303, 1992   DOI
9 A. J. Wills and L. Myers, 'A cost-effective fingerprint recognition system for use with low-quality prints and damaged fingertips,' Pattern Recognition 34, pp.255-270, 2001   DOI   ScienceOn