Presentation | 2010-06-17 Implementation and its Evaluation of A Secure One-Time Passoword Method against the Stolen-Verifier Attack Tatsuya TAKEHISA, Ryoichi ISAWA, Masakatu MORII, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | The SSH is widely used for the construction of the secure communication channel, and the authentic method based on public key cryptography is generally used for the authentic method. When the server information is leaked at the autehtic method based on public key cryptography by the Stolen-Verifier attack etc., the user is danger of being attacked by the impersonation etc. and being leaked the user information. Hashimoto et.al. proposed the one-time password method which is resistant to the Stolen-Verifier attack and other known attacks. In this paper, we apply the authentic method proposed by Hashimoto et. al. for the authentic method of the OpenSSH which is the general implementation of the SSH server, and evaluate the performance. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | authentication / one-time password / stolen-verifier attack |
Paper # | IA2010-7,ICSS2010-7 |
Date of Issue |
Conference Information | |
Committee | IA |
---|---|
Conference Date | 2010/6/10(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Internet Architecture(IA) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Implementation and its Evaluation of A Secure One-Time Passoword Method against the Stolen-Verifier Attack |
Sub Title (in English) | |
Keyword(1) | authentication |
Keyword(2) | one-time password |
Keyword(3) | stolen-verifier attack |
1st Author's Name | Tatsuya TAKEHISA |
1st Author's Affiliation | Security Software R&D Department, Japan Datacom, Co., Ltd.() |
2nd Author's Name | Ryoichi ISAWA |
2nd Author's Affiliation | Crypto Co., Ltd. |
3rd Author's Name | Masakatu MORII |
3rd Author's Affiliation | Graduate School of Engineering, Kobe University |
Date | 2010-06-17 |
Paper # | IA2010-7,ICSS2010-7 |
Volume (vol) | vol.110 |
Number (no) | 78 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |