Access Password

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 117 Experts worldwide ranked by ideXlab platform

Chang Jin-fu - One of the best experts on this subject based on the ideXlab platform.

  • Refereed paper: Smart card based secure Password authentication scheme
    Computers & Security, 1996
    Co-Authors: Wang Shiuh-jeng, Chang Jin-fu
    Abstract:

    This paper presents a smart card based remote Access Password authentication scheme which can verify a log-in Password without verification table. It utilizes the signature property of public key systems. The security of our scheme rests in part on the difficulty of factoring a large number and on the discrete logarithm problem. Not only can the network users freely choose their preferred Passwords, but the network system can also be protected against replay by time stamping the Password.

Pla Information - One of the best experts on this subject based on the ideXlab platform.

  • A Password Authentication Scheme Based on Smart Card
    Computer Engineering, 2004
    Co-Authors: Cao Shoujian, Pla Information
    Abstract:

    A smart card based on remote Access Password authentication scheme is given, which can verify a log-in Password without verification table. It utilizes the signature property of public key systems. Its security is based on the difficulty of factoring a large number and on the discrete logarithm problem. Not only can the network users freely choose their preferred Passwords, but the network system can also be protected against replaying by time stamping the Password.

Wei-cheng Lin - One of the best experts on this subject based on the ideXlab platform.

  • Efficient Implementation of RFID Mutual Authentication Protocol
    IEEE Transactions on Industrial Electronics, 2012
    Co-Authors: Yu-jung Huang, Wei-cheng Lin
    Abstract:

    Researchers have shown that the Electronic Product Code (EPC) Class-1 Generation-2 (C1G2) specification has serious security problems. To overcome these weaknesses, some authors have proposed a specially designed pad generation (PadGen) function to improve security. The PadGen function is used to produce a cover-coding pad to mask the tag's Access Password before the data are transmitted. In this paper, we study the radio-frequency identification (RFID) tag-reader mutual authentication (TRMA) scheme. Two improved authentication protocols for generating the PadGen function are described. A hardware design of these RFID authentication protocols conforming to the International Standards Organization 18000-6 Type-C protocol, also known as EPC C1G2 RFID protocol, is proposed. Since tags have an extremely limited computing power and storage capacity, the PadGen function based on exclusive-or operation for low-cost hardware implementation is reported in this study. The proposed RFID TRMA protocol was simulated using Modelsim XE II and synthesized using Altera's Quartus II software. The functionality of these strengthening protocols was successfully verified in hardware using an Altera DE2 board that included an Altera Cyclone II field-programmable gate array.

Somitra Kumar Sanadhya - One of the best experts on this subject based on the ideXlab platform.

  • RFIDSec - On the Security of Two RFID Mutual Authentication Protocols
    Lecture Notes in Computer Science, 2013
    Co-Authors: Seyed Farhad Aghili, Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani, Somitra Kumar Sanadhya
    Abstract:

    In this paper, the security of two recent RFID mutual authentication protocols are investigated. The first protocol is a scheme proposed by Huang et al. [7] and the second one by Huang, Lin and Li [6]. We show that these two protocols have several weaknesses. In Huang et al.’s scheme, an adversary can determine the 32-bit secret Password with a probability of \(2^{-2}\), and in Huang-Lin-Li scheme, a passive adversary can recognize a target tag with a success probability of \(1-2^{-4}\) and an active adversary can determine all 32 bits of Access Password with success probability of \(2^{-4}\). The computational complexity of these attacks is negligible.

Wang Shiuh-jeng - One of the best experts on this subject based on the ideXlab platform.

  • Refereed paper: Smart card based secure Password authentication scheme
    Computers & Security, 1996
    Co-Authors: Wang Shiuh-jeng, Chang Jin-fu
    Abstract:

    This paper presents a smart card based remote Access Password authentication scheme which can verify a log-in Password without verification table. It utilizes the signature property of public key systems. The security of our scheme rests in part on the difficulty of factoring a large number and on the discrete logarithm problem. Not only can the network users freely choose their preferred Passwords, but the network system can also be protected against replay by time stamping the Password.