A design of one-time password mechanism using public key infrastructure
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, H.-C. | - |
dc.contributor.author | Lee, H.-W. | - |
dc.contributor.author | Lee, K.-S. | - |
dc.contributor.author | Jun, M.-S. | - |
dc.date.available | 2019-04-10T11:20:06Z | - |
dc.date.created | 2018-04-17 | - |
dc.date.issued | 2008 | - |
dc.identifier.isbn | 9780769533223 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/33658 | - |
dc.description.abstract | One-time password mechanism solves password problems like password conjecture and wiretapping that can occur by using the same password several times repeatedly. However, such one-time password mechanism also is exposed to various attacks, and is vulnerable in matters of confidentiality and security protection, the most important elements of security depending on mechanism. This paper solves user disguise problem by authenticating users with the use of public key infrastructure, and guarantees integrity by generating password by applying session identifier L and random value R to hash function in every applicable session. Additionally, to enhance security while transferring the generated password, the mechanism digital signature the password with user's private key, encode it again with service provider's public key, and guarantee denial prevention by requesting the server authentication while being able to verify the identity of user. Therefore in this paper proposes one-time password mechanism that has enhanced security using public key infrastructure to prevent integrity problem due to birthday attack and hash collision problem occurring from hash function. Comparison and analysis of existing one-time password mechanism will tell of the excellence of this paper. © 2008 IEEE. | - |
dc.relation.isPartOf | Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008 | - |
dc.title | A design of one-time password mechanism using public key infrastructure | - |
dc.type | Conference | - |
dc.identifier.doi | 10.1109/NCM.2008.77 | - |
dc.type.rims | CONF | - |
dc.identifier.bibliographicCitation | 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008, v.1, pp.18 - 24 | - |
dc.description.journalClass | 2 | - |
dc.identifier.scopusid | 2-s2.0-57849140658 | - |
dc.citation.conferenceDate | 2008-09-02 | - |
dc.citation.conferencePlace | Gyeongju | - |
dc.citation.endPage | 24 | - |
dc.citation.startPage | 18 | - |
dc.citation.title | 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008 | - |
dc.citation.volume | 1 | - |
dc.contributor.affiliatedAuthor | Jun, M.-S. | - |
dc.type.docType | Conference Paper | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.