Security analysis and improvement of the efficient password-based authentication protocol

被引:8
|
作者
Kwon, T [1 ]
Park, YH
Lee, HJ
机构
[1] Sejong Univ, Fac Sch Comp Engn, Seoul, South Korea
[2] Sejong Cyber Univ, Seoul, South Korea
[3] Kangnam Univ, Fac Dept Math, Yongin, South Korea
关键词
information security; authentication protocol; security analysis;
D O I
10.1109/LCOMM.2005.01032
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We analyze and improve the security of the efficient password-based authentication protocol that has been proposed recently in the Australasian Conference on Information Security and Privacy (ACISP) 2003. Its distinct idea is to utilize two generators of a certain cyclic group for efficiency, while the protocol is vulnerable to the server compromise attack on the contrary to the original assumption. Fortunately, we improve its security in this paper and also remark on its extended version called EPA+.
引用
收藏
页码:93 / 95
页数:3
相关论文
共 50 条
  • [1] Security analysis of a password-based authentication protocol proposed to IEEE 1363
    Zhao, Z
    Dong, ZQ
    Wang, YG
    [J]. THEORETICAL COMPUTER SCIENCE, 2006, 352 (1-3) : 280 - 287
  • [2] An Improvement Password-based Authentication Protocol Using Smart Card
    Hui, Liu
    [J]. SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 2182 - 2185
  • [3] A Protocol to Strengthen Password-Based Authentication
    Sandoval, Itzel Vazquez
    Stojkovski, Borce
    Lenzini, Gabriele
    [J]. EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2018, 2018, 11263 : 38 - 46
  • [4] An efficient client–client password-based authentication scheme with provable security
    Mohammad Sabzinejad Farash
    Mahmoud Ahmadian Attari
    [J]. The Journal of Supercomputing, 2014, 70 : 1002 - 1022
  • [5] An improvement of the password-based authentication protocol (K1P) on security against replay attacks
    Kwon, T
    Kang, M
    Jung, S
    Song, J
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 1999, E82B (07) : 991 - 997
  • [6] An efficient client-client password-based authentication scheme with provable security
    Farash, Mohammad Sabzinejad
    Attari, Mahmoud Ahmadian
    [J]. JOURNAL OF SUPERCOMPUTING, 2014, 70 (02): : 1002 - 1022
  • [7] Analysis and improvement of a password-based authenticated key exchange protocol
    Shu, Jian
    Xu, Chun-Xiang
    [J]. Tongxin Xuebao/Journal on Communications, 2010, 31 (03): : 51 - 56
  • [8] Password-based independent authentication and key exchange protocol
    Jung, KS
    Kim, JY
    Chung, TC
    [J]. ICICS-PCM 2003, VOLS 1-3, PROCEEDINGS, 2003, : 1908 - 1912
  • [9] Password-based user authentication protocol for mobile environment
    Moon, Sung-Won
    Kim, Young-Gab
    Moon, Chang-Joo
    Baik, Doo-Kwon
    [J]. Information Networking: ADVANCES IN DATA COMMUNICATIONS AND WIRELESS NETWORKS, 2006, 3961 : 743 - 753
  • [10] Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol
    Byun, Jin Wook
    Lee, Dong Hoon
    Lim, Jong In
    [J]. IEEE COMMUNICATIONS LETTERS, 2006, 10 (09) : 683 - 685