CompChall: Addressing password guessing attacks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Goyal, V. | - |
dc.contributor.author | Kumar, V. | - |
dc.contributor.author | Singh, M. | - |
dc.contributor.author | Abraham, A. | - |
dc.contributor.author | Sanyal, S. | - |
dc.date.accessioned | 2023-03-09T00:40:35Z | - |
dc.date.available | 2023-03-09T00:40:35Z | - |
dc.date.issued | 2005-04 | - |
dc.identifier.issn | 0000-0000 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/65519 | - |
dc.description.abstract | Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. This paper presents a new authentication protocol which is called CompChall (computational challenge). The proposed protocol uses only one way hash functions as the building blocks and attempts to eliminate online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it does not pose any difficulty to a genuine user but is time consuming and computationally intensive for an adversary trying to launch a large number of login requests per unit time as in the case of an online dictionary attack. The protocol is stateless and thus less vulnerable to DoS (Denial of Service) attacks. © 2005 IEEE. | - |
dc.format.extent | 6 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.title | CompChall: Addressing password guessing attacks | - |
dc.type | Article | - |
dc.identifier.doi | 10.1109/itcc.2005.107 | - |
dc.identifier.bibliographicCitation | International Conference on Information Technology: Coding and Computing, ITCC, v.1, pp 739 - 744 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.scopusid | 2-s2.0-24744465867 | - |
dc.citation.endPage | 744 | - |
dc.citation.startPage | 739 | - |
dc.citation.title | International Conference on Information Technology: Coding and Computing, ITCC | - |
dc.citation.volume | 1 | - |
dc.type.docType | Conference Paper | - |
dc.subject.keywordPlus | Communication channels (information theory) | - |
dc.subject.keywordPlus | Network protocols | - |
dc.subject.keywordPlus | Online systems | - |
dc.subject.keywordPlus | Challenge-response systems | - |
dc.subject.keywordPlus | Computational challenge | - |
dc.subject.keywordPlus | Dictionary attacks | - |
dc.subject.keywordPlus | Password systems | - |
dc.subject.keywordPlus | Security systems | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
84, Heukseok-ro, Dongjak-gu, Seoul, Republic of Korea (06974)02-820-6194
COPYRIGHT 2019 Chung-Ang University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.