DocumentCode :
160599
Title :
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update
Author :
Castiglione, Arcangelo ; De Santis, Alfredo ; Castiglione, Arcangelo ; Palmieri, Francesco
Author_Institution :
Dept. of Comput. Sci., Univ. of Salerno, Fisciano, Italy
fYear :
2014
fDate :
13-16 May 2014
Firstpage :
351
Lastpage :
358
Abstract :
Authentication protocols prevent resources to be accessed by unauthorized users. Password authentication is one of the simplest and most convenient authentication mechanism over insecure networks and, in particular, the one-time authentication mechanism, in which the password is valid only for one login session or transaction are a good compromise between simplicity of use and security. Nowadays many of such protocols have been proposed to implement that type of authentication. However, most of them have several drawbacks because they are characterized by considerable overhead in the Key Setup, Key Scheduling and Key Update phases. In addition, they are often vulnerable to several known attacks and are not particularly suitable to be used by mobile terminals. Furthermore, they often rely on smart-card and other hardware tokens, thus requiring an active participation by the user. In this paper, we present a robust one-time authentication protocol, based on two cryptographically strong building blocks, namely, the Authenticated Key Exchange key exchange and the keyed Hash Message Authentication Code (HMAC), that provides several advantages with respect to most of the available solutions at the state of the art. First, it enables transparent mutual authentication between two endpoints. Moreover, Key Setup, Key Scheduling and Key Update operations are accomplished independently by both endpoints, without requiring any interaction among them, thus ensuring the fully independence by any Trusted Third Party. Finally, the proposed protocol is cryptographically secure, under standard assumptions against most of the already known OTP attacks.
Keywords :
cryptographic protocols; message authentication; scheduling; OTP attacks; authenticated key exchange; cryptographically strong building blocks; hardware tokens; insecure networks; key setup; keyed hash message authentication code; login session; noninteractive key scheduling; noninteractive key update; one-time authentication protocol; password authentication; smart-card; transparent mutual authentication; trusted third party; Authentication; Cryptography; Dictionaries; Message authentication; Protocols; Receivers; Efficient; Key Scheduling; Key Setup; Key Update; Non-interactive; OTA; OTP; One-Time Authentication; Standard Assumptions; Transparent;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on
Conference_Location :
Victoria, BC
ISSN :
1550-445X
Print_ISBN :
978-1-4799-3629-8
Type :
conf
DOI :
10.1109/AINA.2014.45
Filename :
6838686
Link To Document :
بازگشت