Please wait a minute...
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering)  2007, Vol. 8 Issue (8): 1183-1190    DOI: 10.1631/jzus.2007.A1183
Information Science     
Multiple hashes of single key with passcode for multiple accounts
LEE Kok-wah, EWE Hong-tat
Faculty of Engineering & Technology, Multimedia University, Jalan Ayer Keroh Lama, 75450 Bukit Beruang, Melaka, Malaysia; Faculty of Information Technology, Multimedia University, Jalan Multimedia, 63100 Cyberjaya, Selangor, Malaysia
Download:     PDF (0 KB)     
Export: BibTeX | EndNote (RIS)      

Abstract  A human’s e-life needs multiple offline and online accounts. It is a balance between usability and security to set keys or passwords for these multiple accounts. Password reuse has to be avoided due to the domino effect of malicious administrators and crackers. However, human memorability constrains the number of keys. Single sign-on server, key hashing, key strengthening and petname system are used in the prior arts to use only one key for multiple online accounts. The unique site keys are derived from the common master secret and specific domain name. These methods cannot be applied to offline accounts such as file encryption. We invent a new method and system applicable to offline and online accounts. It does not depend on HTTP server and domain name, but numeric 4-digit passcode, key hashing, key strengthening and hash truncation. Domain name is only needed to resist spoofing and phishing attacks of online accounts.

Key wordsKey management      Memorability      Key hashing      Key strengthening      Multiple accounts      Information security     
Received: 11 March 2007     
CLC:  TN918  
  TP309  
Cite this article:

LEE Kok-wah, EWE Hong-tat. Multiple hashes of single key with passcode for multiple accounts. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(8): 1183-1190.

URL:

http://www.zjujournals.com/xueshu/zjus-a/10.1631/jzus.2007.A1183     OR     http://www.zjujournals.com/xueshu/zjus-a/Y2007/V8/I8/1183

[1] Jeng Fuh-gwo, Wang Chung-ming. A practical and dynamic key management scheme for a user hierarchy[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(3 ): 3-.
[2] REN Kui, PARK Jaemin, KIM Kwangjo. On the construction of cryptographically strong Boolean functions with desirable trade-off[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6( 5): 2-.