The Weakness of Moon et al.'s Password Authentication Scheme

被引:0
|
作者
Irawan, Bam-bang [1 ,2 ]
Hwang, Min-shiang [1 ,3 ]
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn, 500 Lioufeng Rd, Taichung 41354, Taiwan
[2] Esa Unggul Univ, Dept Comp Sci, Arjuna Utara 9 Rd, Kebon Jeruk 11510, West Jakarta, Indonesia
[3] China Med Univ, China Med Univ Hosp, Dept Med Res, 91 Hsueh Shih Rd, Taichung 40402, Taiwan
关键词
CRYPTANALYSIS; SECURITY;
D O I
10.1088/1742-6596/1069/1/012070
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Using smart cards make remote transactions easier for users in Internet. It's important to identity the legal users to have the access right to obtain the resources. In 2017, Liu et al. proposed an efficient and secure smart card based password authentication scheme. Recently, Moon et al. pointed some weaknesses of Liu et al.'s scheme. They also proposed a password authentication scheme to overcome Liu et al.'s weaknesses. They claim that their scheme is more secure and practical as a remote user authentication scheme. However, we find that some weaknesses of Moon et al.'s scheme. In this article, we will show that Moon et al.'s scheme is vulnerable to the guessing identity and impersonation attacks.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Weakness and simple improvement of a password authentication scheme based on geometric appraoch
    Ku, WC
    Chang, ST
    Chen, HH
    Tsaur, MJ
    [J]. LCN 2005: 30TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2005, : 472 - 473
  • [22] A Secure and Efficient TMIS-Based Authentication Scheme Improved Against Zhang et al.'s Scheme
    Alzahrani, Bander A.
    Irshad, Azeem
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (12) : 8239 - 8253
  • [23] A Secure and Efficient TMIS-Based Authentication Scheme Improved Against Zhang et al.’s Scheme
    Bander A. Alzahrani
    Azeem Irshad
    [J]. Arabian Journal for Science and Engineering, 2018, 43 : 8239 - 8253
  • [24] An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Shafiq, Muhammad
    Usman, Muhammad
    Asif, Muhammad
    Ali, Sajid
    Kumari, Saru
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2019, 48 (02): : 211 - 224
  • [25] Improvement of Chien et al.'s remote user authentication scheme using smart cards
    Lee, SW
    Kim, HS
    Yoo, KY
    [J]. COMPUTER STANDARDS & INTERFACES, 2005, 27 (02) : 181 - 183
  • [26] Security Issues of Chen et al.'s Dynamic ID-based Authentication Scheme
    Khan, Muhammad Khurram
    Kumari, Saru
    Wang, Xiaomin
    Kumar, Rahul
    [J]. 2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 125 - +
  • [27] Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme
    Ma, Chun-Guang
    Wang, Ding
    Zhang, Qi-Ming
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2012, 7154 : 141 - 152
  • [28] Smart-card-loss-attack and Improvement of Hsiang et al.'s Authentication Scheme
    Lee, Y. C.
    [J]. JOURNAL OF APPLIED RESEARCH AND TECHNOLOGY, 2013, 11 : 597 - 603
  • [29] Cryptanalysis of Wang et al.'s remote user authentication scheme using smart cards
    Yoon, Eun-Jun
    Lee, Eun-Jung
    Yoo, Kee-Young
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 575 - +
  • [30] Security of Chien et al.'s remote user authentication scheme using smart cards
    Hsu, CL
    [J]. COMPUTER STANDARDS & INTERFACES, 2004, 26 (03) : 167 - 169