{"id":25352,"date":"2014-08-06T21:44:17","date_gmt":"2014-08-07T01:44:17","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25352"},"modified":"2014-08-06T21:44:17","modified_gmt":"2014-08-07T01:44:17","slug":"new-type-of-cryptography-that-can-better-resist-dictionary-attacks","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/new-type-of-cryptography-that-can-better-resist-dictionary-attacks.php","title":{"rendered":"New type of cryptography that can better resist &quot;dictionary attacks&quot;"},"content":{"rendered":"<p><p>Aug 05, 2014            <\/p>\n<p>    Cryptographers in China have have developed a new type of    cryptography that can better resist so-called offline    \"dictionary attacks\", denial of service (DoS) hacks, and cracks    involving eavesdroppers. Their approach, reported in the    International Journal of Electronic Security and Digital    Forensics, extends and improves a type of cryptography that    uses an intractable mathematical problem as its basis.  <\/p>\n<p>    Public-key cryptography uses the complexity of    certain mathematical problems that would take even a    supercomputer many years to solve, to lock up data that only a    person with the private key can unlock. Early public-key    systems used the problem of finding the prime factors of a very    large integer. More recent protocols exploit the problem of    finding the discrete logarithm of a random elliptic curve    element with respect to a publicly known base point. This is    the \"elliptic curve discrete logarithm problem\" and is an    example of a mathematical problem that is essentially    impossible to solve at the highest level without an array of    supercomputers and tens of thousands of years at one's    disposal. And, yet, it is very efficient in terms of    computation to implement and encrypt data.  <\/p>\n<p>    Unfortunately, encryption systems always have loopholes and can    always succumb to bugs or attacks on the computer system on    which they run. The most recent form of elliptical encryption    widely used for internet logins and other applications can be    breached by a so-called offline dictionary attack that simply    tests every possible key, or password, non-complex passwords thus succumbing    the quickest. More the protocol can be attacked by an    eavesdropper who monitors and replicates password entry by    users or otherwise breaks the system, through a denial of service, attack allowing entry via the    backdoor.  <\/p>\n<p>    Pengshuai Qiao of North China University of Water Resources and    Electric Power, in Zhengzhou, and Hang Tu of Wuhan University,    Wuhan, China, explain that two fundamental requirements of    secure communications over an insecure public network are    password authentication and password updating. Previous    researchers have extended password authentication and update    schemes based on elliptic curve cryptography to the point where    they are entirely robust against replay attack,    man-in-the-middle attack, modification attack and other    potential breaches. However, this system, developed by computer    scientists Hafizul Islam of the Birla Institute of Technology    and Science in Pilani and GP Biswas of the Indian School of    Mines, Dhanbad, India, failed to defend against offline    password guessing attack and stolen-verifier attack.  <\/p>\n<p>    Qiao and Tu have now devised an algorithm for on elliptic curve    cryptography that precludes such security breaches by using a    four-phase approach: registration phase, password    authentication phase, password change phase and session key    distribution phase. These are the same steps used with the    Islam-Biswas scheme but Qiao and Tu add two additional    calculations on the user side for the final single-session    password. This change means that offline dictionary attacks    will never succeed because even if the hacker guesses the    user's password they will not have the necessary algorithm to    recalculate the actual session password used each time by the    user. The same addition also thwarts stolen-verifier attacks,    because even if a third-party has access to the verification    protocol used by the system, they would still need to be able    to do the one-time additional pair of calculations for the    given session.  <\/p>\n<p>    The team's initial testing of the new system bodes well for    secure implementation on a wide range of platforms for    everything from mobile banking to web logins.<\/p>\n<p>     Explore further:     Passwords no more? Researchers develop mechanisms that enable    users to log in securely without passwords  <\/p>\n<p>    More information: Qiao, P. and Tu, H. (2014) 'A security    enhanced password authentication and update scheme based on    elliptic curve cryptography', Int. J. Electronic Security    and Digital Forensics, Vol. 6, No. 2, pp.130-139. <a href=\"http:\/\/www.inderscience.com\/info\/inar\" rel=\"nofollow\">http:\/\/www.inderscience.com\/info\/inar<\/a>    icle.php?artid=63109<\/p>\n<p>      (Phys.org) Passwords are a common security measure to      protect personal information, but they don't always prevent      hackers from finding a way into devices. Researchers from the      University of Alabama at ...    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/phys.org\/news326447793.html\/RK=0\/RS=dr.OvuZd5ShQ43QtVAJ0NU77NO8-\" title=\"New type of cryptography that can better resist &quot;dictionary attacks&quot;\">New type of cryptography that can better resist &quot;dictionary attacks&quot;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Aug 05, 2014 Cryptographers in China have have developed a new type of cryptography that can better resist so-called offline \"dictionary attacks\", denial of service (DoS) hacks, and cracks involving eavesdroppers. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-25352","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25352"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25352"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25352\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}