Home Mathematics Challenge response password security using combinatorial group theory
Article
Licensed
Unlicensed Requires Authentication

Challenge response password security using combinatorial group theory

  • Gilbert Baumslag , Yegor Bryukhov , Benjamin Fine and Douglas Troeger
Published/Copyright: June 23, 2010
Become an author with De Gruyter Brill
Groups Complexity Cryptology
From the journal Volume 2 Issue 1

Abstract

Challenge response methods are increasingly used to enhance password security. In this paper we present a very secure method for challenge response password verification using combinatorial group theory. This method, which relies on the group randomizer system, a subset of the MAGNUS computer algebra system, handles most of the present problems with challenge response systems. Theoretical security is based on several results in asymptotic group theory.

Received: 2009-04-20
Revised: 2009-10-15
Published Online: 2010-06-23
Published in Print: 2010-June

© de Gruyter 2010

Downloaded on 22.12.2025 from https://www.degruyterbrill.com/document/doi/10.1515/gcc.2010.005/html?lang=en
Scroll to top button