Detection of Attacks on Single Sign-On Mechanism for Distributed Computer Networks

Authors

  • Prof. Vaishali Arun Hiray Dept of Computer Science & Engg, St.mary group Hydearabad

Keywords:

SSO, Databases, Secure Computing, RSA

Abstract

The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single
credential to be authenticated by multiple service providers in a distributed computer network. Recently, Chang and Lee
proposed a new SSO scheme and claimed its security by providing well-organized security arguments. In this paper,
however, we demonstrative that their scheme is actually insecure as it fails to meet credential privacy and soundness of
authentication. Specifically, we present two impersonation attacks. The first attack allows a malicious service provider,
who has successfully communicated with a legal user twice, to recover the user’s credential and then to impersonate the
user to access resources and services offered by other service providers. In another attack, an outsider without any
credential may be able to enjoy network services freely by impersonating any legal user or a nonexistent user. We
identify the flaws in their security arguments to explain why attacks are possible against their SSO scheme. Our attacks
also apply to another SSO scheme proposed by Hsu and Chuang, which inspired the design of the Chang–Lee scheme.
Moreover, by employing an efficient verifiable encryption of RSA signatures proposed by Ateniese, we propose an
improvement for repairing the Chang–Lee scheme. We promote the formal study of the soundness of authentication as
one open problem.

Published

2016-04-25

How to Cite

Detection of Attacks on Single Sign-On Mechanism for Distributed Computer Networks. (2016). International Journal of Advance Engineering and Research Development (IJAERD), 3(4), 17-22. https://ijaerd.org/index.php/IJAERD/article/view/1268

Similar Articles

1-10 of 609

You may also start an advanced similarity search for this article.