International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Information Technology | India | Volume 3 Issue 7, July 2014

Verifier Based Prevention for an Offline Password Guessing Attack Using ECC

Radhika L. Bhosale, Manoj L. Bangare

In remote server system, user authentication is an essential requirement. To verify the authenticity of the remote users over insure channel, various authentication methods have been proposed so far. The use of passwords for user authentication is very simple and commonly used method. The password selected by clients may be simple and easy to remember. Hence, it is responsibility of password authentication schemes to securely exchange password related information between server and client over insecure channel. Many password authentication schemes have been published but found susceptible to various attacks. ECC based existing password authentication scheme provides different features and efficient in some way. But it is found that the existing password authentication scheme is vulnerable to offline password guessing attack, stolen verifier attack and denial of service attack. The proposed password authentication scheme is based on ECC and password verifier. ECC is a public key cryptography system better than RSA cryptography because with the same key size, it gives a higher security level than RSA. Proposed scheme allows the client and server to select two random numbers independently and perform computations without exchanging them. Hence the attacker cant guess password from dictionary as he or she is unaware of random numbers selected by the client and server. Proposed password authentication scheme provides prevention scheme for an offline password guessing attack based on ECC. It also helps to securely share id based secret key between client and server.

Keywords: Offline Password Guessing Attack, Password Verifier, Elliptic Curve Cryptography, Password Authentication, Shared Secret Key

Edition: Volume 3 Issue 7, July 2014

Pages: 2120 - 2124


How to Cite this Article?

Radhika L. Bhosale, Manoj L. Bangare, "Verifier Based Prevention for an Offline Password Guessing Attack Using ECC", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2021556, Volume 3 Issue 7, July 2014, 2120 - 2124

24 PDF Views | 24 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Elliptic Curve Cryptography'

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 2120 - 2124

Verifier Based Prevention for an Offline Password Guessing Attack Using ECC

Radhika L. Bhosale, Manoj L. Bangare

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 689 - 692

Providing Kerberos Authentication Using Elliptic Curve Cryptography

Monalisha Mishra, G. Sujatha

Share this article

Research Paper, Information Technology, India, Volume 8 Issue 1, January 2019

Pages: 456 - 460

Analysis of Blockchain and its Working Principle

S. Banupriya, G. Renuka Devi

Share this article



Similar Articles with Keyword 'Password Authentication'

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 2120 - 2124

Verifier Based Prevention for an Offline Password Guessing Attack Using ECC

Radhika L. Bhosale, Manoj L. Bangare

Share this article

Research Paper, Information Technology, India, Volume 6 Issue 4, April 2017

Pages: 1808 - 1811

Enhancing 3 Level Security using 3D Password

Divya Prem Chandran, Sailee Sunil Rajeshirke

Share this article



Similar Articles with Keyword 'Shared Secret Key'

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 2120 - 2124

Verifier Based Prevention for an Offline Password Guessing Attack Using ECC

Radhika L. Bhosale, Manoj L. Bangare

Share this article

Survey Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 1307 - 1311

A Survey on Authentication Techniques and User Recognition

Vyanktesh Dorlikar, Anjali Chandavale

Share this article
Top