{"title":"基于龙格-库塔法的网上银行虚拟密码","authors":"S. Mohammadi, Saeede Zare Hosseini","doi":"10.1109/ICCSN.2010.118","DOIUrl":null,"url":null,"abstract":"Today, user authentication is one of the fundamental procedures to ensure secure communication on online services. Among the authentication methods password –based is popular and widely used. So having a strong password authentication without any vulnerability is essential. In this paper, we propose a password-based remote user authentication with virtual password concept to secure users’ passwords in on-line environments. We use Runge-Kutta method with linear functions as virtual function to hide user password from adversary in public channel. We analyzed the vulnerabilities and possible attacks in the proposed method and suggest proper seclusions. This paper, also considers how this method can defend against password cracker, man-in-the-middle, phishing and password file compromise attacks.","PeriodicalId":255246,"journal":{"name":"2010 Second International Conference on Communication Software and Networks","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Virtual Password Using Runge-Kutta Method for Internet Banking\",\"authors\":\"S. Mohammadi, Saeede Zare Hosseini\",\"doi\":\"10.1109/ICCSN.2010.118\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today, user authentication is one of the fundamental procedures to ensure secure communication on online services. Among the authentication methods password –based is popular and widely used. So having a strong password authentication without any vulnerability is essential. In this paper, we propose a password-based remote user authentication with virtual password concept to secure users’ passwords in on-line environments. We use Runge-Kutta method with linear functions as virtual function to hide user password from adversary in public channel. We analyzed the vulnerabilities and possible attacks in the proposed method and suggest proper seclusions. This paper, also considers how this method can defend against password cracker, man-in-the-middle, phishing and password file compromise attacks.\",\"PeriodicalId\":255246,\"journal\":{\"name\":\"2010 Second International Conference on Communication Software and Networks\",\"volume\":\"49 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-02-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 Second International Conference on Communication Software and Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSN.2010.118\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Conference on Communication Software and Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSN.2010.118","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Virtual Password Using Runge-Kutta Method for Internet Banking
Today, user authentication is one of the fundamental procedures to ensure secure communication on online services. Among the authentication methods password –based is popular and widely used. So having a strong password authentication without any vulnerability is essential. In this paper, we propose a password-based remote user authentication with virtual password concept to secure users’ passwords in on-line environments. We use Runge-Kutta method with linear functions as virtual function to hide user password from adversary in public channel. We analyzed the vulnerabilities and possible attacks in the proposed method and suggest proper seclusions. This paper, also considers how this method can defend against password cracker, man-in-the-middle, phishing and password file compromise attacks.