...
首页> 外文期刊>Industrial Informatics, IEEE Transactions on >Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
【24h】

Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks

机译:分布式计算机网络单点登录机制的安全性分析

获取原文
获取原文并翻译 | 示例
           

摘要

Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential to be authenticated by multiple service providers in a distributed computer network. Recently, Chang and Lee proposed a new SSO scheme and claimed its security by providing well-organized security arguments. In this paper, however, we demonstrative that their scheme is actually insecure as it fails to meet credential privacy and soundness of authentication. Specifically, we present two impersonation attacks. The first attack allows a malicious service provider, who has successfully communicated with a legal user twice, to recover the user's credential and then to impersonate the user to access resources and services offered by other service providers. In another attack, an outsider without any credential may be able to enjoy network services freely by impersonating any legal user or a nonexistent user. We identify the flaws in their security arguments to explain why attacks are possible against their SSO scheme. Our attacks also apply to another SSO scheme proposed by Hsu and Chuang, which inspired the design of the Chang–Lee scheme. Moreover, by employing an efficient verifiable encryption of RSA signatures proposed by Ateniese, we propose an improvement for repairing the Chang–Lee scheme. We promote the formal study of the soundness of authentication as one open problem.
机译:单一登录(SSO)是一种新的身份验证机制,它使具有单个凭据的合法用户可以由分布式计算机网络中的多个服务提供商进行身份验证。最近,Chang和Lee提出了一种新的SSO方案,并通过提供井井有条的安全性论据来声称其安全性。但是,在本文中,我们证明了它们的方案实际上是不安全的,因为它不能满足凭据的私密性和认证的可靠性。具体来说,我们提出两种模拟攻击。第一次攻击使恶意服务提供者(已与合法用户成功通信两次)可以恢复用户的凭据,然后冒充用户访问其他服务提供者提供的资源和服务。在另一种攻击中,没有任何凭据的外部人可能可以通过模拟任何合法用户或不存在的用户来自由享用网络服务。我们在安全性论证中找出缺陷,以解释为什么可能对其SSO方案进行攻击。我们的攻击还适用于Hsu和Chuang提出的另一种SSO方案,该方案启发了Chang-Lee方案的设计。此外,通过采用Ateniese提出的RSA签名的有效可验证加密,我们提出了一种修复Chang-Lee方案的改进。我们提倡对认证的健全性进行正式研究,这是一个开放的问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号