21
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

A new password authentication mechanism based on two phases encryption

Pages 463-480 | Received 01 Mar 2001, Published online: 18 Jun 2013
 

Abstract

Password authentication plays an important role for the computer system security. This research proposed the private-key cryprosystem based password authentication model. In this model, we adopt Lennon’s [14] test pattern concept and use the two phases encryption model to generate the test pattern. Except Hwang’s [11] method which is to change the system master key and there is no need to know or to store the user’s password. Meanwhile, we can also avoid many problems produced during the real application on the public-key cryptosystem proposed by Hwang [11]. E.g. it is very difficult to use if the password is too long; if the user name changes that the password needs to be changed also etc.

Our proposed password authentication model not only provides the system security management a more convenient and easy way to use and to maintain but also reduces the administrator’s responsibility in managing system master key. However, this new model also gives contributions and helps to those users who demand the high security and effective systems.

In this paper, we will propose a new password authentication mechanism based on two phases encryption. Except Hwang’s method which is to change the master key and there is no need to know or to store the users’ password, and meanwhile we can also avoid some problems in the real application of the public-key cryptosystem. E.g. the calculation takes times; the password is too long to be memorized; and if we change the password then the user identity needs to be changed also which will be very difficult to manage etc. The second section will discuss our proposed password authentication model. The third section will be divided into three stages which are the registration, the authentication and the system master key alternation to explain the practice in details for the new password authentication model. In the fourth section, the security of our proposed password authentication model will be analysed. Finally, a conclusion will be drawn.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.