Secure remote user access over insecure networks

  • Authors:
  • Mohammad Peyravian;Clark Jeffries

  • Affiliations:
  • IBM Corporation, Research Triangle Park, NC 27709, USA;IBM Corporation, Research Triangle Park, NC 27709, USA

  • Venue:
  • Computer Communications
  • Year:
  • 2006

Quantified Score

Hi-index 0.24

Visualization

Abstract

Remote user authentication based on passwords over untrusted networks is the conventional method of authentication in the Internet and mobile communication environment. Typical secure remote user access solutions rely on pre-established secure cryptographic keys, public-key infrastructure, or secure hardware. In this paper, we present secure password-based protocols for remote user authentication, password change, and session key establishment over insecure networks. The proposed protocols do not require the use of any additional private- or public-key infrastructure.