The Weakness of Moon et al.'s Password Authentication Scheme

被引:0
|
作者
Irawan, Bam-bang [1 ,2 ]
Hwang, Min-shiang [1 ,3 ]
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn, 500 Lioufeng Rd, Taichung 41354, Taiwan
[2] Esa Unggul Univ, Dept Comp Sci, Arjuna Utara 9 Rd, Kebon Jeruk 11510, West Jakarta, Indonesia
[3] China Med Univ, China Med Univ Hosp, Dept Med Res, 91 Hsueh Shih Rd, Taichung 40402, Taiwan
关键词
CRYPTANALYSIS; SECURITY;
D O I
10.1088/1742-6596/1069/1/012070
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Using smart cards make remote transactions easier for users in Internet. It's important to identity the legal users to have the access right to obtain the resources. In 2017, Liu et al. proposed an efficient and secure smart card based password authentication scheme. Recently, Moon et al. pointed some weaknesses of Liu et al.'s scheme. They also proposed a password authentication scheme to overcome Liu et al.'s weaknesses. They claim that their scheme is more secure and practical as a remote user authentication scheme. However, we find that some weaknesses of Moon et al.'s scheme. In this article, we will show that Moon et al.'s scheme is vulnerable to the guessing identity and impersonation attacks.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Drawbacks of Liao et al.'s password authentication scheme
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, PROCEEDINGS, 2006, : 101 - +
  • [2] Weakness and solution of Yang et al.'s protected password changing scheme
    Yoon, EJ
    Yoo, KY
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 295 - 304
  • [3] Weakness of remote authentication scheme of Chen et al.
    Tang, Hong-bin
    Liu, Xin-song
    Chen, Jian-ying
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (11) : 3199 - 3203
  • [4] Security of Shen et al.'s timestamp-based password authentication scheme
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 665 - 671
  • [5] An improvement on Yang et al.'s password authentication schemes
    Kim, KW
    Jeon, JC
    Yoo, KY
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (01) : 207 - 215
  • [6] Cryptanalysis and the improvement of Kim et al.'s password authentication schemes
    Giri, Debasis
    Srivastava, P. D.
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2007, 4812 : 156 - 166
  • [7] Attacks on the shen et al.'s timestamp-based password authentication scheme using smart cards
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (01) : 319 - 321
  • [8] Comment on Xu et al.'s Key Agreement and Password Authentication Protocol
    Guo, Yongning
    Liu, Chenglian
    [J]. FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 3847 - +
  • [9] Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments
    Chung, Hao-Rung
    Ku, Wei-Chi
    Tsaur, Maw-Jinn
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) : 863 - 868
  • [10] Attacks and solutions of Yang et al.'s protected password changing scheme
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    [J]. INFORMATICA, 2005, 16 (02) : 285 - 294