By Topic

Cryptanalysis of password authentication schemes: Current status and key issues

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Sandeep K. Sood ; Department of Electronics & Computer Engineering, Indian Institute of Technology, Roorkee, India ; Anil K. Sarje ; Kuldip Singh

Password is the most commonly used technique for user authentication due to its simplicity and convenience. The main advantage of passwords is that users can memorize them easily without needing any hardware to store them. Efficient password authentication schemes are required to authenticate the legitimacy of remote users over an insecure communication channel. In this paper, we presented the survey of all currently available password based authentication schemes and classified them in terms of several crucial criteria. This study will help in developing different password based authentication techniques, which are not vulnerable to different attack scenarios. Two and three party key exchange protocols require secure authentication mechanism for achieving the required goals and satisfying the security requirements of an ideal password based authentication scheme. Smart cards, which are used in financial transactions require highly secure authentication protocols.

Published in:

Methods and Models in Computer Science, 2009. ICM2CS 2009. Proceeding of International Conference on

Date of Conference:

14-15 Dec. 2009