Security analysis on the authentication mechanisms of Korean popular messengers

被引:0
|
作者
Shin, Donghwi [1 ]
Choi, Youngsung [1 ]
Lee, Yunho [1 ]
Park, Sangjoon [1 ]
Kim, Seungjoo [1 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Informat Secur Grp, 300 Cheoncheon Dong, Suwon 440746, Gyeonggi Do, South Korea
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The "NateOn" messenger is the most popular messenger in Korea (It has 17,160,000 users in Korea). In this paper, we will analyze the security of authentication mechanism of the NateOn. We will show that the "NateOn Ver 3.5.15.0(600)" is very vulnerable to the replay attack and the dictionary attack. Furthermore, we will show that other messengers such as "BuddyBuddy Ver 5.8" (It has 5,980,000 users in Korea), "Daum Touch Ver 5.06101300" (It has 2,384,000 users in Korea), etc. have the similar security problems.
引用
收藏
页码:547 / +
页数:2
相关论文
共 50 条
  • [41] Vulnerability Analysis of the Grid Data Security Authentication System
    Yang, Seung S.
    Choi, Hongsik
    Joo, Hankyu
    INFORMATION SECURITY JOURNAL, 2010, 19 (04): : 182 - 190
  • [42] Biometrics Authentication System on Open Network and Security Analysis
    Wu, Zhenhua
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 549 - 553
  • [43] Security and performance analysis of the SEAP authentication protocol in MANETs
    Maity, Soumyadev
    Hansdah, R. C.
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2017, 24 (03) : 183 - 203
  • [44] Security Analysis and Design of a Uniform Identity Authentication System
    Chen, Lingmin
    Xie, Xiaoyao
    Xu, Yang
    Xia, Daoxun
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 174 - 178
  • [45] Security analysis of and proposal for image-based authentication
    Newman, RE
    Harsh, P
    Jayaraman, P
    39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 141 - 144
  • [46] Security Analysis of a Mutual Authentication Protocol for RFID Systems
    Yang, Yuanyuan
    Lu, Zhen
    Chen, Zhuo
    Wei, Xiang
    Gu, Jian
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 252 - 255
  • [47] Security Analysis and Improvement on Two RFID Authentication Protocols
    Wang, Shaohui
    Liu, Sujuan
    Chen, Danwei
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (01) : 21 - 33
  • [48] Security analysis of secure password authentication for keystroke dynamics
    Song, Hyunsoo
    Kwon, Taekyoung
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 1, PROCEEDINGS, 2006, 4251 : 916 - 923
  • [49] Security Analysis of WAPI Access Authentication Protocol WAI
    Zhang Ruihong
    Yang Wei
    INNOVATIVE COMPUTING AND INFORMATION, PT II, 2011, 232 : 253 - 258
  • [50] Dynamic Password Authentication : Designing Step and Security Analysis
    Pansa, Detchasit
    Chomsiri, Thawatchai
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 518 - 523