Security analysis of secure password authentication for keystroke dynamics

Hyunsoo Song, Taekyoung Kwon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Password-based authentication and key distribution are important in today's computing environment. Since passwords are easy to remember for human users, the password-based system is used widely. However, due to the fact that the passwords are chosen from small space, the password-based schemes are more susceptible to various attacks including password guessing attacks. Recently, Choe and Kim proposed a new password authentication scheme for keystroke dynamics. However, in this paper, we cryptanalyze the Choe-Kim scheme and show it is vulnerable to various types of attacks such as server-deception attacks, server-impersonation attacks and password guessing attacks. We also comment on the scheme that more care must be taken when designing password-based schemes and briefly show how the standard like IEEE P1363.2 can be used for strengthening those schemes.

Original languageEnglish
Title of host publicationKnowledge-Based Intelligent Information and Engineering Systems - 10th International Conference, KES 2006, Proceedings
PublisherSpringer Verlag
Pages916-923
Number of pages8
ISBN (Print)3540465359, 9783540465355
DOIs
Publication statusPublished - 2006
Event10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2006 - Bournemouth, United Kingdom
Duration: 2006 Oct 92006 Oct 11

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4251 LNAI - I
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2006
CountryUnited Kingdom
CityBournemouth
Period06/10/906/10/11

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Security analysis of secure password authentication for keystroke dynamics'. Together they form a unique fingerprint.

Cite this