Research on the Network Security Protocols Based on the Strand Spaces Theory

Article Preview

Abstract:

This paper focuses on different password guessing attack forms of attacker performed based on the strand spaces model. We extend the attacker’s strand spaces model in order to describe and analyze the guessing ability of the attacker. A protocol has been improved by the use of Hash function. The improved protocol has been proved to resist password guessing attack.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1134-1138

Citation:

Online since:

October 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Bellare M.Pointcheval D,Rogaway P.Authenticated keyexchange secure against dictionary attacks Proceedings ofAdvances in Cryptology—Eurocrypt 2000,2000:139一l 55.

Google Scholar

[2] Lomas T, Li Gong, SaltzerJet al. Reducing risks from poorly chosen keys. ACM Operating Systems Review, 1989, 23(5): 14-18.

DOI: 10.1145/74851.74853

Google Scholar

[3] BellovinS. Merritt M. Augumented encrypted key exchange: a password-based protocolsecure against dictionary attacks and password file compromise. Proc. of CCS'93, New York: ACM Press, 1993: 244-250.

DOI: 10.1145/168588.168618

Google Scholar

[4] Lowe G. Analyzing protocols subject to guessing attack. Journal of Computer Security, 2004, 12(1): 83-98.

Google Scholar

[5] Longshigong,Luowenjun, Yuanchaowei, the password guessing attack in the strand space model, the journal of Beijing University of Posts and Telecommunications, 2007, 30(1): 62-65.

Google Scholar