Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2008, Vol. 31 ›› Issue (5): 93-97.doi: 10.13190/jbupt.200805.93.chenag

• Reports • Previous Articles     Next Articles

Password Management Scheme Based on Trusted Computing
CHEN Ai-guo, XU Guo-ai, YANG Yi-xian

CHEN Ai-guo, XU Guo-ai, YANG Yi-xian   

  1. Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China)
  • Received:2008-03-25 Revised:1900-01-01 Online:2008-10-30 Published:2008-10-30
  • Contact: CHEN Ai-guo

Abstract:

The existed password management methods are not secured enough but inconvenient to change each account password. Based on the key technologies of trusted computing, such as key management, security storage and authorized access control, a new password management scheme is proposed. This scheme helps users manage multiple accounts by turning a single memorized password into a different password for each account. The implementation of the scheme is discussed and compared its strength and usability to those of related approaches. Unlike previous approaches, our scheme is both highly resistant to brute force attacks and convenient to execute a password change for each password. It also can prevent phishing.

Key words: trusted computing, password authentication, password management, phishing

CLC Number: