Practical Password-Based Two-Server Authentication and Key Exchange System
#1


Presented By:
Yanjiang Yang

Robert H. Deng

Feng Bao


ABSTRACT
Most password-based user authentication systems place total trust on the authentication server where cleartext passwords or easily derived password verification data are stored in a central database. Such systems are, thus, by no means resilient against offline dictionary attacks initiated at the server side. Compromise of the authentication server by either outsiders or insiders subjects all user passwords to exposure and may have serious legal and financial repercussions to an organization. Recently, several multiserver password systems were proposed to circumvent the single point of vulnerability inherent in the single-server architecture. However, these multiserver systems are difficult to deploy and operate in practice since either a user has to communicate simultaneously with multiple servers or the protocols are quite expensive. In this paper, we present a practical password-based user authentication and key exchange system employing a novel two-server architecture. Our system has a number of appealing features. In our system, only a front-end service server engages directly with users while a control server stays behind the scene; therefore, it can be directly applied to strengthen existing single-server password systems. In addition, the system is secure against offline dictionary attacks mounted by either of the two servers.


read full report
http://portal.acmcitation.cfm?id=1137557
http://citeseerx.ist.psu.edu/viewdoc/dow...1&type=pdf
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: money exchange, implementation of 3d password in system, image based password authentication project, password authenticated key exchange by juggling, secure key exchange and encryption mechanism for group communication in adhoc networks, secure key exchange mechanism ppt, password authentication touchscreen,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 26,606 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curv project report helper 2 3,145 31-10-2015, 02:16 PM
Last Post: seminar report asees
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 116 82,028 03-04-2014, 11:39 PM
Last Post: seminar report asees
  TWO WAY STUDENT INFORMATION SYSTEM USING CELLULAR TECHNOLOGY smart paper boy 3 3,471 24-12-2012, 11:24 AM
Last Post: seminar details
  A Secure Mobile Healthcare System using Trust-Based Multicast Scheme seminar class 3 7,951 22-12-2012, 10:54 AM
Last Post: seminar details
  SLEEP SERVER & ITS ENTERPRISE APPLICATION seminar surveyer 5 2,888 03-12-2012, 11:25 PM
Last Post: Guest
  A survey of usage of Data Mining and Data Warehousing in Academic Institution and Lib seminar class 1 2,118 29-11-2012, 12:56 PM
Last Post: seminar details
  Public Key Cryptography and the RSA algorithm seminar class 1 2,468 23-11-2012, 11:32 AM
Last Post: seminar details
  A Hand Gesture Recognition System Based on Local Linear Embedding seminar class 1 4,261 22-11-2012, 12:00 PM
Last Post: seminar details
  AI-based Classification and Retrieval of Reusable Software Components computer girl 0 1,039 11-06-2012, 12:07 PM
Last Post: computer girl

Forum Jump: