Chatterjee et al., 2017 - Google Patents
The typtop system: Personalized typo-tolerant password checkingChatterjee et al., 2017
View PDF- Document ID
- 682054769680637617
- Author
- Chatterjee R
- Woodage J
- Pnueli Y
- Chowdhury A
- Ristenpart T
- Publication year
- Publication venue
- Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
External Links
Snippet
Password checking systems traditionally allow login only if the correct password is submitted. Recent work on typo-tolerant password checking suggests that usability can be improved, with negligible security loss, by allowing a small number of typographical errors …
- 230000017105 transposition 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Chatterjee et al. | The typtop system: Personalized typo-tolerant password checking | |
| Chatterjee et al. | pASSWORD tYPOS and how to correct them securely | |
| Baum et al. | PESTO: proactively secure distributed single sign-on, or how to trust a hacked server | |
| Wang et al. | How to end password reuse on the web | |
| Florêncio et al. | An {Administrator’s} guide to internet password research | |
| CN100432889C (en) | System and method providing disconnected authentication | |
| TWI233739B (en) | Systems, methods and computer readable recording medium for remote password authentication using multiple servers | |
| JP4881119B2 (en) | User authentication method, user side authentication device, and program | |
| US9077710B1 (en) | Distributed storage of password data | |
| Kogan et al. | T/key: Second-factor authentication from secure hash chains | |
| US9325499B1 (en) | Message encryption and decryption utilizing low-entropy keys | |
| US9843574B1 (en) | Methods and apparatus for generating chaff passwords for use in a password-hardening system | |
| Woodage et al. | A new distribution-sensitive secure sketch and popularity-proportional hashing | |
| Jiang et al. | An anonymous and efficient remote biometrics user authentication scheme in a multi server environment | |
| Blocki et al. | Gotcha password hackers! | |
| Nielsen et al. | Improving usability of passphrase authentication | |
| Gupta et al. | Shamir's secret sharing for authentication without reconstructing password | |
| Kulynych et al. | ClaimChain: Improving the security and privacy of in-band key distribution for messaging | |
| Han et al. | A secure two-factor authentication key exchange scheme | |
| Nair et al. | Multi-factor credential hashing for asymmetric brute-force attack resistance | |
| Cappos et al. | PolyPasswordHasher: protecting passwords in the event of a password file disclosure | |
| Cao et al. | LPbT-SSO: Password-based threshold single-sign-on authentication from LWE | |
| Pongmorrakot et al. | tPAKE: typo-tolerant password-authenticated key exchange | |
| KR100986980B1 (en) | Biometric Authentication Methods, Clients, and Servers | |
| Chaudhary et al. | Interoperable identity management protocol for multi-cloud platform |