DocumentCode :
1607524
Title :
A General Way to Break Hash-based Challenge-and-Response
Author :
Liu, Fanbao ; Chen, Yasha ; Dong, Yuan
Author_Institution :
Sch. of Comput., Nat. Univ. of Defense Technol., Changsha, China
fYear :
2012
Firstpage :
59
Lastpage :
62
Abstract :
Hash-based challenge-and-response protocols are widely used as an authentication scheme in network applications. The authenticator sends a random string as a challenge to the peer, the peer generates a response with a hash function on a pre-shared password combined the received challenge. In this paper, we propose a general and efficient way to break some prevalent hash-based challenge- and-response protocols in use. These protocols are vulnerable to the chosen challenge attack launched by a malicious user, who impersonates the server. We first generate a rainbow table containing hash values of all possible passwords, which is produced by hashing a pre-chosen challenge concatenated with all possible password candidates. Second, we impersonate the authenticator and send the pre-chosen challenge to the peer. Finally, we look up in the rainbow table for the received response from the peer to crack the password. With this tactic, we can do the cost consuming pre-computation once, and then we can always use it to recover all of the peer´s passwords with only one additional on-line query.
Keywords :
cryptographic protocols; message authentication; authentication scheme; cryptographic hash functions; hash values; hash-based challenge-and-response protocols; network applications; online query; preshared password; rainbow table generation; random string; Authentication; Cryptography; Force; Internet; Protocols; Servers;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Industrial Control and Electronics Engineering (ICICEE), 2012 International Conference on
Conference_Location :
Xi´an
Print_ISBN :
978-1-4673-1450-3
Type :
conf
DOI :
10.1109/ICICEE.2012.24
Filename :
6322313
Link To Document :
بازگشت