AuthStore: Password-based Authentication and Encrypted Data Storage in Untrusted Environments

05/14/2018
by   Clemens Zeidler, et al.
0

Passwords are widely used for client to server authentication as well as for encrypting data stored in untrusted environments, such as cloud storage. Both, authentication and encrypted cloud storage, are usually discussed in isolation. In this work, we propose AuthStore, a flexible authentication framework that allows users to securely reuse passwords for authentication as well as for encrypted cloud storage at a single or multiple service providers. Users can configure how secure passwords are protected using password stretching techniques. We present a compact password-authenticated key exchange protocol (CompactPAKE) that integrates the retrieval of password stretching parameters. A parameter attack is described and we show how existing solutions suffer from this attack. Furthermore, we introduce a password manager that supports CompactPAKE.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/04/2018

Secure and Efficient Skyline Queries on Encrypted Data

Outsourcing data and computation to cloud server provides a cost-effecti...
research
04/29/2022

Semi-Assisted Signal Authentication based on Galileo ACAS

A GNSS signal authentication concept named semi-assisted authentication ...
research
11/22/2017

Cloud-Based Secure Authentication (CSA) Protocol Suite for Defense against DoS Attacks

Cloud-based services have become part of our day-to-day software solutio...
research
07/14/2023

Assessing and Exploiting Domain Name Misinformation

Cloud providers' support for network evasion techniques that misrepresen...
research
03/24/2023

One Protocol to Rule Them All? On Securing Interoperable Messaging

European lawmakers have ruled that users on different platforms should b...
research
02/02/2019

Data Exfiltration via Multipurpose RFID Cards and Countermeasures

Radio-frequency identification(RFID) technology is widely applied in dai...
research
05/21/2020

Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-Entropy Secrets

We revisit the problem of entity authentication in decentralized end-to-...

Please sign up or login with your details

Forgot password? Click here to reset