Method for cryptographically strict identification with password reuse blocking
DOI:
https://doi.org/10.18372/2073-4751.78.18955Keywords:
Zero Knowledge identification, cryptographically strong identification, identification based on irreversible transformations of modular arithmetic, chains of related passwordsAbstract
A method for cryptographically strict identification of remote users with the combined use of irreversible transformations of modular arithmetic and functionally interconnected session passwords is theoretically justified and developed, which eliminates the possibility of their reuse by an attacker.
In addition, to speed up the identification process on the system side, it is proposed to use irreversible transformations of modular algebra that are asymmetric in the volume of calculations.
A mathematical justification for the proposed method and numerical examples that illustrate its operation are given. It has been theoretically and experimentally proven that the proposed method makes it possible to block the reuse of user passwords, as well as speed up the process of identification by the system by 2-3 orders of magnitude.
References
Schneier B. Applied Cryptography. Protocols, Algorithms, and Source Code in C. 2nd ed. New York : John Wiley & Sons, Inc., 1996. 784 p.
Han M. et al. Zero-knowledge identity authentication for internet of vehicles: Improvement and application. PLoS ONE. 2020. Vol. 15, no. 9. P.217–247.
Conti M., Dragoni N., Lesyk V. A Survey of Man in the Middle Attacks. IEEE Communications Surveys and Tutorials. 2016. Vol. 18, no. 3. P. 2027–2051. DOI: 10.1109/COMST.2016.2548426.
Васильєва М. Д., Дайко І. В., Саницький А. П. Метод швидкої ідентифікації віддалених абонентів на основі концепції нульових знань. Наука і техніка сьогодні. 2024. № 3(31). С. 791–803. DOI: 10.52058/2786-6025-2024-3(31)-791-804.
Lamport L. Password Authentication with Insecure Communication. Communications of the ACM. 1981. Vol. 24, no. 11. P. 770–772.
Bardis N., Doucas N., Markovskyi O. Zero-Knowledge Identification Method Based on Block Ciphers. 2017 International Conference on Control, Artificial Intelligence, Robotics & Optimization (ICCAIRO) : proceedings, Prague, Czech Republic, 20–22 May 2017 / IEEE. 2017. P. 307–311. DOI: 10.1109/ICCARO.2017.63.
Русанова О. В., Дайко І. В. Метод криптографічно строгої ідентифікації віддалених абонентів на базі генераторів псевдовипадкових послідовностей. Проблеми управління та інформатизації. 2023. № 1(77). С. 68–79. DOI: 10.18372/2073-4751.76.18244.
Feige U., Fiat A., Shamir A. Zero knowledge proofs of identity. Journal of Cryptology. 1988. Vol. 1, no. 2. P. 77–94.
Method for Identification Subscribers and for Generating and Verifying Electronic Signatures in data Exchange System : patent no. 4995082 : H04K 1/00. No. 484127; filed 23.02.1990. published 19.02.1991.
Guillou L. C., Quisquater J. J. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory. Lecture Notes in Computer Science. Vol. 330. Advances in Cryptology – EUROCRYPT '88. Workshop on the Theory and Application of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988. Proceedings / ed. by G. Goos, J. Hartmanis. Berlin, 1988. P. 123–128.
Марковський О. П., Лефтеріс Захаріудакіс, Максимук В. Р. Використання алгебри полів Галуа для реалізації концепції нульових знань при ідентифікації та автентифікації віддалених. Електронне моделювання. 2017. № 6. С.96–110.
Марковський О. П., Дайко І. В. Метод криптографічно строгої ідентифікації на основі незворотних перетворень на основі табличних перетворень на полях Галуа. Адаптивні системи автоматичного управління. 2024. Том. 1, № 44. С. 127–141. DOI: 10.20535/1560-8956.44.2024.302429.
Голоскоков О. Є., Голоскокова О. А., Мошко Є. О. Основи теорії експоненційних систем масового обслуговування : навч. посіб. Харків : НТУ “ХПІ”, 2017. 312 с.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal adheres to the principles of Open Access and provides free, immediate, and permanent access to all published materials without financial, technical, or legal barriers for readers.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.