Security enhancement for two remote user authentication schemes

被引:0
|
作者
Peng, SH [1 ]
Han, Z [1 ]
Liu, JQ [1 ]
机构
[1] Beijing Jiaotong Univ, Res Ctr Informat Secur Architecture, Beijing 100044, Peoples R China
关键词
password authentication; hash function; denial of service attack;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In 2002,Lee,Li,and Hwang proposed a hash-based password authentication scheme that is efficient and can be easily implemented.Recently,Ku, Chen,and Lee demonstrated that Lee-Li-Hwang's hash-based password authentication scheme is vulnerable to the off line guessing attack, the denial of service attack, and the stolen verifier attack. In 2003, Chih-Wei Lin et al. proposed a security enhancement for optimal strong password authentication protocol. This paper, however, will demonstrate that Chih-Wei Lin's scheme is vulnerable to the denial of service attack. In this article, we shall propose improved schemes to these two remote user authentication schemes, which make them able to withstand denial of service attack and have about the same computational cost as original's.
引用
收藏
页码:2628 / 2631
页数:4
相关论文
共 50 条
  • [1] Security enhancement on an improvement on two remote user authentication schemes using smart cards
    Chen, Tien-Ho
    Hsiang, Han-Cheng
    Shih, Wei-Kuan
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING-THEORY METHODS AND APPLICATIONS, 2011, 27 (04): : 377 - 380
  • [2] Security of two remote user authentication schemes using smart cards
    Hsu, CL
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2003, 49 (04) : 1196 - 1198
  • [3] Security Analysis of Two Remote User Authentication Schemes Using Bilinear Pairings
    Tan, Zuowen
    [J]. ICMECG: 2009 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT, PROCEEDINGS, 2009, : 435 - 439
  • [4] On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems
    Kim, Kee-Won
    Lee, Jae-Dong
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (05)
  • [5] On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems
    Kee-Won Kim
    Jae-Dong Lee
    [J]. Journal of Medical Systems, 2014, 38
  • [6] Security flaws in two improved remote user authentication schemes using smart cards
    Ma, Chun-Guang
    Wang, Ding
    Zhao, Sen-Dong
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (10) : 2215 - 2227
  • [7] Security Enhancement on an Improvement on Two Remote User Authentication Scheme Using Smart Cards
    Hsiang, HanCheng
    Chen, TienHo
    Shih, WeiKuan
    [J]. COMMUNICATION AND NETWORKING, 2009, 56 : 65 - +
  • [8] Further attacks and comments on 'Security of two remote user authentication schemes using smart cards'
    Phan, RCW
    Goi, BM
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 609 - 611
  • [9] Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity
    Kim, Seil
    Chun, Ji Young
    Lee, Dong Hoon
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2235 - 2239
  • [10] Security enhancement of a remote user authentication scheme using smart cards
    Lee, Youngsook
    Nam, Junghyun
    Won, Dongho
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 508 - +