Weaknesses of the Yoon-Kim-Yoo Remote User Authentication Scheme Using Smart Cards

被引:0
|
作者
Chen, Te-Yu [1 ]
Ling, Chung-Huei [2 ]
Hwang, Min-Shiang [2 ,3 ]
机构
[1] Natl Tainan Jr Coll Nursing, Tainan, Taiwan
[2] Asia Univ, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[3] China Med Univ, Dept Hlth Serv Adm, Shenyang 110001, Peoples R China
关键词
cryptography; user authentication; guessing attack; Smart card; PASSWORD AUTHENTICATION; EFFICIENT; SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A user authentication scheme is a mechanism employed by a server to authenticate the legality of a user before he/she is allowed to access the resource or service provided by the server. Due to the Internet's openness and lack of security concern, the user authentication scheme is one of the most important security primitives in the Internet activities. Many researchers have been devoted to the study of this issue. There are many authentication schemes have been proposed up to now. However, most of these schemes have both the advantages and disadvantages. Recently, Yoon, Kim and Yoo proposed a remote user authentication scheme which is an improvement of Liaw et al.'s scheme. Unfortunately, we find their scheme is not secure enough. In this paper, we present some flaws in Yoon-Kim-Yoo's scheme. This proposed cryptanalysis contributes important heuristics on the secure concern when researchers design remote user authentication schemes.
引用
收藏
页码:771 / 774
页数:4
相关论文
共 50 条
  • [1] Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards
    Hsiang, Han-Cheng
    Shih, Wei-Kuan
    [J]. COMPUTER COMMUNICATIONS, 2009, 32 (04) : 649 - 652
  • [2] Improvement of Lee-Kim-Yoo's remote user authentication scheme using smart cards
    Sun, DZ
    Cao, ZF
    [J]. FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PT 2, PROCEEDINGS, 2005, 3614 : 596 - 599
  • [4] Weaknesses and improvements of a remote user authentication scheme using smart cards
    Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China
    [J]. J. China Univ. Post Telecom., 3 (91-94):
  • [5] On the security of Yoon and Yoo's biometrics remote user authentication scheme
    [J]. Liu, Ming, 1600, World Scientific and Engineering Academy and Society, Ag. Ioannou Theologou 17-23, Zographou, Athens, 15773, Greece (11):
  • [6] Weaknesses of a remote user authentication scheme using smart cards for multi-server architecture
    Ku, WC
    Chang, ST
    Chiang, MH
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (08) : 3451 - 3454
  • [7] Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
    Ku, WC
    Chen, SM
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (01) : 204 - 207
  • [8] Security weaknesses and improvements of a fingerprint-based remote user authentication scheme using smart cards
    [J]. Yang, H.-K. (hkyang@kangnam.ac.kr), 1600, Advanced Institute of Convergence Information Technology (04):
  • [9] A New Remote User Authentication Scheme Using Smart Cards
    Li Huiqin
    Xu Lili
    [J]. ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 205 - 208
  • [10] An improvement of remote user authentication scheme using smart cards
    Jeon, Jun-Cheol
    Kang, Byung-Heon
    Kim, Se-Min
    Lee, Wan-Soo
    Yoo, Kee-Young
    [J]. MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 416 - +