Password authentication with insecure communication

Article Properties
Abstract
Cite
Lamport, Leslie. “Password Authentication With Insecure Communication”. Communications of the ACM, vol. 24, no. 11, 1981, pp. 770-2, https://doi.org/10.1145/358790.358797.
Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770-772. https://doi.org/10.1145/358790.358797
Lamport L. Password authentication with insecure communication. Communications of the ACM. 1981;24(11):770-2.
Journal Categories
Science
Mathematics
Instruments and machines
Electronic computers
Computer science
Science
Mathematics
Instruments and machines
Electronic computers
Computer science
Computer software
Technology
Electrical engineering
Electronics
Nuclear engineering
Electronics
Computer engineering
Computer hardware
Description

How can password authentication remain secure even when communication channels are compromised? This paper introduces a method for user password authentication that provides security despite an intruder's ability to read data and tamper with communications. This innovative approach addresses the challenge of secure authentication in environments with insecure communication channels. The method relies on a secure one-way encryption function and can be implemented using a microcomputer in the user's terminal. This makes it practical for various systems, including those with limited resources. The proposed system can function effectively if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system. The proposed authentication method offers a robust solution for protecting passwords in vulnerable environments. With its simple implementation and reliance on a secure encryption function, it provides a practical approach to enhancing security in various systems. The method contributes to the field of computer security by providing a new tool for password authentication. Keywords: communication, computer science, information technology, security.

Published in Communications of the ACM, a leading journal in computer science, this paper addresses a core concern in the field: secure communication. The proposed password authentication method aligns with the journal's focus on practical solutions to real-world computing challenges. Its relevance to data security and system integrity makes it suitable for the journal's readership.

Refrences
Citations
Citations Analysis
The first research to cite this article was titled Broadcast Encryption Based on Bidirectional Remote Authentication Scheme and was published in 1969. The most recent citation comes from a 2024 study titled Broadcast Encryption Based on Bidirectional Remote Authentication Scheme . This article reached its peak citation in 2013 , with 78 citations.It has been cited in 277 different journals, 9% of which are open access. Among related journals, the Wireless Personal Communications cited this research the most, with 48 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year