Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

CompChall: Addressing password guessing attacks

Full metadata record
DC Field Value Language
dc.contributor.authorGoyal, V.-
dc.contributor.authorKumar, V.-
dc.contributor.authorSingh, M.-
dc.contributor.authorAbraham, A.-
dc.contributor.authorSanyal, S.-
dc.date.accessioned2023-03-09T00:40:35Z-
dc.date.available2023-03-09T00:40:35Z-
dc.date.issued2005-04-
dc.identifier.issn0000-0000-
dc.identifier.urihttps://scholarworks.bwise.kr/cau/handle/2019.sw.cau/65519-
dc.description.abstractEven though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. This paper presents a new authentication protocol which is called CompChall (computational challenge). The proposed protocol uses only one way hash functions as the building blocks and attempts to eliminate online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it does not pose any difficulty to a genuine user but is time consuming and computationally intensive for an adversary trying to launch a large number of login requests per unit time as in the case of an online dictionary attack. The protocol is stateless and thus less vulnerable to DoS (Denial of Service) attacks. © 2005 IEEE.-
dc.format.extent6-
dc.language영어-
dc.language.isoENG-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.titleCompChall: Addressing password guessing attacks-
dc.typeArticle-
dc.identifier.doi10.1109/itcc.2005.107-
dc.identifier.bibliographicCitationInternational Conference on Information Technology: Coding and Computing, ITCC, v.1, pp 739 - 744-
dc.description.isOpenAccessN-
dc.identifier.scopusid2-s2.0-24744465867-
dc.citation.endPage744-
dc.citation.startPage739-
dc.citation.titleInternational Conference on Information Technology: Coding and Computing, ITCC-
dc.citation.volume1-
dc.type.docTypeConference Paper-
dc.subject.keywordPlusCommunication channels (information theory)-
dc.subject.keywordPlusNetwork protocols-
dc.subject.keywordPlusOnline systems-
dc.subject.keywordPlusChallenge-response systems-
dc.subject.keywordPlusComputational challenge-
dc.subject.keywordPlusDictionary attacks-
dc.subject.keywordPlusPassword systems-
dc.subject.keywordPlusSecurity systems-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Software > School of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE