authentication. We denote two-factor authentication in
section 2.2, and physical characteristic in section 2.3.
2.1 Password Authentication
2.1.1 Challenge Response
Challenge response is proved that third party can’t
obtain password of users because a response code,
that is encrypted and a challenge code, that is
generated by random number generator are delivered
on packet on network (Atsuko and Hiroaki, 2003).
The following procedure is CHAP (Challenge
Handshake Authentication Protocol) (Simpson,
1996), which is used challenge response method in
password authentication. A password is encrypted by
hash function with the key in challenge response
method. Just for information, hash function link hash
value and digital data that is called for private key and
calculate it.
1. Users send a server authentication demand.
2. The server generates challenge code (hereinafter
it is called C) by random number generator and
sends the user it.
3. The user encrypts C with a password (hereinafter
it is called PW) that the user has by hash function
with the key (hereinafter it is called R ←
H
K
(PW,C)) and sends the server it with user’s ID.
4. The server encrypts C with administered PW
bound to the ID, verifies whether generated value
and received value in procedure 3 are identical or
not (“ACK” means success of this verification,
and “NAK” means failure of this verification),
and notifies the user of result of this verification.
Figure 1: Procedure of CHAP.
2.1.2 Problems
Password authentication is a user authentication that
use password bound to user’s ID as an authentication
element. Password authentication accounts for
approximate 80% of user authentications (Symantec
Corporation, 2013). However, it is thought that users
set a password that is easy to be guessed such as
user’s birthday in user authentication because of
difference of security awareness of users. In addition,
there are a lot of the users who use a same password
in plural sites because remembering plural passwords
is a burden for the users (Information-technology
Promotion Agency Japan, 2014).
From the above a reason, assailants obtain lists of
user’s ID and password bound to user’s ID and try
login using it illegally (Information-technology
Promotion Agency Japan, 2015). As a result,
information leaks occur frequently.
2.2 Two-factor Authentication
Two-factor authentication is a user authentication,
that uses two authentication elements in three
authentication elements shown below (SOPHOS,
2014).
1) Information that users memorize
(E.g. password, personal identification number)
2) Objects which users possess (e.g. IC card, token)
3) Characteristics that users have
(E.g. handwriting, fingerprints)
The problem that was described in 2.1.2 needs a
solution. Therefore, a goal of this study is to
strengthen security of password authentication by
adding one authentication element.
Handwriting is used for an authentication element
with a password in this paper and the reason is
denoted in 3.1.
2.3 Behavioral Characteristic
First, biological information is classified in two types.
The first of two types is physical features such as iris
and fingerprint, and the second of two types is
behavioral characteristics such as handwriting and
walking (Atsuko and Hiroaki, 2003). Using
biological information for an authentication element
has advantages for users. We denote advantages and
defects of the two types as follows.
Possibility of the authentication that use physical
features accept another persons is extremely low
(Information-technology Promotion Agency Japan,
2012). However, changing physical features that are
used for an authentication element is difficult when
physical features leaked out. On the other hand, users
feel less resistance to authentication that use
behavioral characteristics (Kensuke et al., 2015) and
can easily change behavioral characteristics
(Information-technology Promotion Agency Japan,
2015).