5.4 Impersonation attacks
User impersonation attacks are prevented since the previous messages sent on the
communication channel cannot help an adversary in calculating authentication mes-
sages needed in his/her current authentication. We employ a changing verifier to
avoid replay attacks and thus prevent user impersonation. Server impersonation attack
is prevented by requiring server to send h(N
A
|| N
i+1
|| h
2
(S||P||N
i
)) in step4 to prove
that the server has the password verifier, and an adversary can not simply replay old
messages to impersonate server because N
A
is random and unique for every authenti-
cation protocol run so that a server impersonator can not generate a valid step4 mes-
sage to complete server authentication.
6 Conclusion
In summary, it is not an easy task to design a secure and efficient password authenti-
cation protocol without requiring the use of storage devices like smart cards or the
use of public key cryptographic techniques. Based on the analysis of security flaws of
a typical hash-based authentication protocol-OSPA, we present a hash-based Strong-
Password Authentication Scheme (SPAS), which can achieve mutual authentication
and is resistant to DoS attacks, replay attacks, impersonation attacks, and stolen-
verifier attacks.
References
1. M. Sandirigama, A. Shimizu and M. T. Noda: Simple and secure password authentication
protocol (SAS). IEICE Transactions on Communications, vol. E83-B, no. 6 (2000)1363-
1365
2. Halevi, S. and Krawczyk, H: Public-key cryptography and password protocols. In: Pro-
ceedings of 5th ACM Conference On Computer and Communications Security, San Fran-
cisco, CA (1998) 122–131
3. C. L. Lin, H. M. Sun, and T. Hwang: Attacks and solutions on strong-password authentica-
tion. IEICE Transactions on Communications, vol. E84-B, no. 9, (2001) 2622--2627
4. C.M. Chen and W.C. Ku: Stolen-verifier attack on two new strong-password authentication
protocols. IEICE Transactions on Communications, vol. E58-B, no. 11, (2002)2519-2521
5. N.M. Haller: On internet authentication. RFC 1704, Oct. 1994
6. N.M. Haller: The S/KEY one-time password system. In: Proceedings of Internet Society
Symposium on Network and Distributed System Security (1994)151–158
7. N.M. Haller: A one-time password system. RFC 1938, May 1996
8. C. Kaufman, R. Perlman, and M. Speciner. Network Security-Private communication in a
public world. Prentice Hall (2002)
9. Leslie Lamport: Password authentication with insecure communication. Communications
of the ACM, v.24 n.11 (1981)770-772
10. C.J. Mitchell and L. Chen. Comments on the S/KEY user authentication scheme. ACM
Operating Systems Review, vol.30, no.4 (1996)12–16
11. A. Shimizu: A dynamic password authentication method by one-way function. IEICE
Transactions, vol.J73-D-I, no.7 (1990) 630–636
19