Please use this identifier to cite or link to this item:
http://localhost:8081/xmlui/handle/123456789/317
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sood, Sandeep Kumar | - |
dc.date.accessioned | 2014-09-13T12:15:49Z | - |
dc.date.available | 2014-09-13T12:15:49Z | - |
dc.date.issued | 2010 | - |
dc.identifier | Ph.D | en_US |
dc.identifier.uri | http://hdl.handle.net/123456789/317 | - |
dc.guide | Singh, Kuldip | - |
dc.description.abstract | This thesis is a study ofpassword based authentication and key agreement protocols. Due to simplicity and convenience, password is the most commonly used authentication technique to authenticate users onthe web. The main advantage ofpasswords is that users can memorize them easily without needing any hardware to store them. Efficient password authentication schemes are required to authenticate the legitimacy of remote users over an insecure communication channel. In this thesis, we propose some password based authentication protocols for different types of environments as well as an anti-phishing protocol. Improvements to several static and dynamic identity based authentication protocols have also been suggested. Password based authentication is used in online web applications and is highly susceptible to phishing attacks. The average user can not distinguish a well designed phishing website from the legitimate site because the phishing site is designed in a manner that imitates visual characteristics of the target organization's website by using similar colors, icons, logos and textual descriptions. Phishing is doing direct damage to the financial industry and is also affecting the expansion of e-commerce. One of the reasons for success of phishing attacks is high rate of password reuse because users tend to use the same password with more and more accounts. Users find it difficult to remember several complex passwords and hence it is difficult to prevent phishing and dictionary attacks. In 2007, Gouda et al. proposed a single password based anti-phishing protocol for Hyper Text Transfer Protocol authentication that allows a userto choose a single password of his choice for multiple online accounts on different web servers. In this thesis, we show that Gouda et al.'s protocol is insecure against offline dictionary attack, denial of service attack and man-in-the-middle attack in presence of an active attacker. Also an improvement to Gouda et al.'s protocol is proposed that can resist offline dictionary attack and denial of service attack. It is however found that Gouda et al.'s protocol is not repairable for manin- the-middle attack. We propose a new single password based anti-phishing protocol that resolves aforementioned problems and is secure against different types of attacks. In this protocol, the client machine's browser generates a dynamic identity and a dynamic password for each new login request to the server. The dynamic identity and dynamic in password generated for a client are different in different sessions of the Secure Socket Layer (SSL) protocol. Password based authentication protocols are susceptible to dictionary attacks by means of automated programs because most of the user chosen passwords are limited to the user's personal domain. We propose a cookie based and an inverse cookie based virtual password authentication protocols. In cookie based virtual password authentication protocol, the web server stores a cookie on the user's computer if the user has successfully authenticated himself to the web server from that computer. On the other hand, in an inverse cookie based virtual password authentication protocol, the web server stores cookie on the user's computer when he has not submitted correct identity and password for his authentication to the web server. In both these protocols, the computational effort required from the attacker during login on to the web server increases exponentially with each login failure. The concept of trust has been used so that the legitimate client can easily authenticate himself to the web server from any computer irrespective of whether that computer contains cookie or not. The client generated virtual password for a user is different in each new session of SSL protocol. These concepts combine traditional password authentication with a challenge that is easy to answer by a legitimate client but the computation cost of authentication for an attacker increases with each login failure. Therefore, even automated programs can not launch online dictionary attacks on these proposed protocols. These protocols removes some of the deficiencies of previously suggested password based authentication protocols and are shown to be secure against different types of attacks that can be launched by the attacker. Most of the password based authentication protocols rely on a single authentication server for user's authentication. The user's password verification information stored on the single server is a main point of susceptibility and remains an attractive target for the attacker. We present Single Sign-On (SSO) password based two-server authentication protocol that issues a ticket to the user for a specific time period. The user can use this ticket to generate dynamic ticket information to login on to the authentication server. Ticket issued for one authentication server can be used for user authentication on another authentication server that is under the control of the same control server. Our protocol uses two-server paradigm by imposing different levels of trust upon the two servers so that password verification information is distributed between two servers (an authentication server and a control server). Therefore, the proposed protocol is more resistant to dictionary attacks as compared to other existing single-server password based authentication protocols. The proposed protocol is efficient and practical for its implementation because it does not use public key that causes computation and communication burden in a resource constrained environment. Next, a brief review of some static identity based smart card authentication protocols is presented. Cryptanalysis ofthese protocols is carried out for different types of attacks and improved protocols are proposed. The comparison ofthe cost and functionality ofthe proposed protocols with the other related protocols is also done. Yoon et al. (2005) proposed a remote user authentication scheme which is an improvement on Hwang et al.'s scheme. However, we found that Yoon et al.'s scheme can easily reveal auser's password and is susceptible to impersonation attack using stolen smart card. This scheme is also found to be susceptible to parallel session attack and man-in-the-middle attack. We propose a remote user authentication scheme that resolves the aforementioned problems, while keeping the merits of Yoon et al.'s scheme. We also analyze the smart card based authentication protocols ofKim and Chung (2009), Xu et al. (2009) and Liu et al. (2008) and show that they are susceptible to different types ofattacks. We propose improvements ofthese protocols to overcome their weaknesses. Next, this thesis investigates some smart card authentication protocols for different attack scenarios and improved dynamic identity based smart card authentication protocols are proposed. In 2004, Das et al. proposed a dynamic identity based remote user authentication protocol. Many researchers demonstrated that Das et al.'s protocol is susceptible to several types ofattacks. In 2005, Liao et al. published an improved protocol and claimed that this improved scheme withstands password guessing attack and insider attack. However, we found that Liao et al.'s protocol is also susceptible to malicious user attack, impersonation attack, stolen smart card attack and offline password guessing attack. Moreover, Liao et al.'s protocol does not maintain the user's anonymity and its password change phase is insecure. We present a secure dynamic identity based authentication protocol using smart cards to resolve the aforementioned problems, while keeping the merits of different dynamic identity based authentication protocols. We also analyze the smart card based authentication protocols of Liou et al. (2006), Wang et al. (2009), Lee et al. (2005) and Hsiang and Shih (2009) and show that they are susceptible to different types of attacks. We propose improvements of these protocols to overcome their weaknesses. The security analysis of the proposed improved protocols is presented. The comparison of the cost and functionality of the proposed protocols with the other related protocols is also done. In e-commerce, the number of servers providing the services to the user is usually more than one and hence secure authentication protocols for multi-server environment are required. Moreover, the multi-server architecture based authentication protocols make it difficult for the attacker to find out any significant authentication information related to the legitimate users. In 2009, Liao and Wang proposed a dynamic identity based remote user authentication protocol for multi-server environment. But we found that Liao and Wang's protocol is susceptible to malicious server attack and malicious user attack. We propose a dynamic identity based authentication protocol for multi-server architecture using smart card that resolves the aforementioned security flaws, while keeping the merits of Liao and Wang's protocol. In 2009, Hsiang and Shih improved Liao and Wang's dynamic identity based remote user authentication protocol for multi-server environment. However, we show that Hsiang and Shih's protocol is susceptible to replay attack, impersonation attack and stolen smart card attack. Moreover, the password change phase of Hsiang and Shih's protocol is incorrect. We present a dynamic identity based authentication protocol for multi-server architecture using smart card that resolves the aforementioned flaws, while keeping the merits of Hsiang and Shih's protocol. The proposed protocols use two-server paradigm by imposing different levels of trust upon the two servers and the user's authentication functionality is distributed between these two servers known as the service provider server and the control server. In our proposed single password based anti-phishing protocol, client can use a single password for different online accounts and that password can not be detected by any of the malicious server or the attacker. This protocol is equally secure for security ignorant users, who are not very conversant with the browser's security indicators. The protocol does not allow the server to know the client's password at any time. This protocol can be easily integrated into different types of services such as banking and enterprise applications. The proposed cookies based and inverse cookie based virtual password authentication protocols are very effective to thwart online dictionary attacks because the computation cost oflogin on to the web server increases exponentially with each login failure for an attacker. The legitimate client can easily authenticate himself to the web server from any computer irrespective of whether that computer contains cookie or not. SSO authentication is time efficient because it allows the user to enter his identity and password once within a specific time period to login on to multiple hosts and applications within an organization. Most ofthe existing SSO password based authentication protocols are designed for single-server environment. We proposed an efficient SSO password based two-server architecture in which the userhas to login once to get a valid ticket. Smart card based password authentication is one ofthe most convenient ways to provide multi-factor authentication by acquiring the smart card and knowing the correct identity and correct password for the communication between a client and a server. Improvements to several static and dynamic identity based authentication protocols have also been suggested. User's privacy is an important issue in e-commerce applications. The proposed dynamic identity based authentication protocols aim to provide the privacy to the user's identity so that users are anonymous in communication channel. Also the concept of two-tier authentication for the client makes it difficult for an attacker to guess out the information pertaining to password and ticket. Confidence of clients in e-commerce and other online transactions can be enhanced by negating phishing, dictionary and other possible attacks. The work presented in this thesis is a step toward making e-commerce transactions more reliable and secure. | en_US |
dc.language.iso | en | en_US |
dc.subject | PASSWORD BASED AUTHENTICATION | en_US |
dc.subject | KEY AGREEMENT PROTOCOLS | en_US |
dc.subject | PHISHING PROTOCOL | en_US |
dc.subject | DYNAMIC PROTOCOL | en_US |
dc.title | ON PASSWORD BASED AUTHENTICATION AND KEY AGREEMENT PROTOCOLS | en_US |
dc.type | Doctoral Thesis | en_US |
dc.accession.number | G20597 | en_US |
Appears in Collections: | DOCTORAL THESES (E & C) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ON PASSWORD BASED AUTHENTICATION AND KEY AGREEMENT PROTOCOLS.pdf | 14.42 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.