Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2003.10C.6.763

A S/KEY Based Secure Authentication Protocol Using Public Key Cryptography  

You, Il-Sun (단국대학교 대학원 전산통계학과)
Cho, Kyung-San (단국대학교 정보컴퓨터학부)
Abstract
In this paper, we propose a S/KEY based authentication protocol using smart cards to address the vulnerebilities of both the S/KEY authentication protocol and the secure one-time password protpcol which YEH, SHEN and HWANG proposed [1]. Because out protpcel is based on public key, it can authenticate the server and distribute a session key without any pre-shared secret. Also, it can prevent off-line dictionary attacks by using the randomly generated user is stored in the users smart card. More importantly, it can truly achieve the strength of the S/KEY scheme that no secret information need be stored on the server.
Keywords
Authentication; One Time Password; S/KEY; Smart Card;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Denning and G. Sacco, 'Timestamps in Key Distribution Systems,' Commun. ACM, Vol.24, No.8, pp.533-536, August, 1981   DOI
2 S. Kim, B. Kim, S. Park and S. Yen, 'Comments on Password-Based Private Key Download Protocol of NDSS '99,' Electron. Lett., Vol.35, No.22, pp.1937-1938, 1999   DOI   ScienceOn
3 W. C. Ku, C. M. Chen and H. L. Lee, 'Cryptoanalysis of a Variant of Peyravian- Zunic' s Password Authentication Scheme,' IEICE Trans. Commun., VoI.E86-B, No.5, pp. 1682-1684, May, 2003
4 한국정보보호진흥원, '일회용 패스워드 기술', http://www.kisa.or.kr/technology/sub4/password.htm, 1998
5 T. C. Yeh, H. Y. Shen and J. J. Hwang, 'A Secure One-Time Password Authentication Scheme Using Smart Cards,' IEICE Trans. Commun., Vol.E85-B, No.11, pp.2515-2518, Nov., 2002   DOI
6 N. Haller, C. Metz, P. Nesser and M. Straw, 'A one-time password system,' RFC 2289, Feb., 1998
7 N. Haller, 'The S/KEY one-time password,' RFC 1760, Feb., 1995
8 C. J. Mitchell and L. Chen, 'Comments on the S/KEY user authentication scheme,' ACM Operating Systems Review, Vol.30, No.4, pp.12-16, Oct., 1996   DOI