Cryptanalysis of a password authentication scheme over insecure networks

被引:32
|
作者
Xiang, Tao [1 ]
Wong, Kwok-Wo [2 ]
Liao, Xiaofeng [1 ]
机构
[1] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[2] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Hong Kong, Peoples R China
关键词
password authentication; guessing attack; replay attack; denial-of-service attack;
D O I
10.1016/j.jcss.2007.05.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The security of a password authentication scheme using smart cards proposed by Liao et al. [I.-E. Liao, C.-C. Lee, M.-S. Hwang, A password authentication scheme over insecure networks, J. Comput. System Sci. 72 (2006) 727-740] is analyzed. Three kinds of attacks are presented in different scenarios. (c) 2007 Elsevier Inc. All rights reserved.
引用
收藏
页码:657 / 661
页数:5
相关论文
共 50 条
  • [1] Cryptanalysis of Enhancements of a Password Authentication Scheme over Insecure Networks
    Kumar, Manoj
    Gupta, Mridul Kumar
    Kumari, Saru
    [J]. CONTEMPORARY COMPUTING, 2011, 168 : 524 - +
  • [2] A password authentication scheme over insecure networks
    Liao, I-En
    Lee, Cheng-Chi
    Hwang, Min-Shiang
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2006, 72 (04) : 727 - 740
  • [3] An improvement on a password authentication scheme over insecure networks
    Zeng, Yong
    Ma, Jianfeng
    [J]. Journal of Computational Information Systems, 2009, 5 (04): : 1331 - 1336
  • [4] Cryptanalysis and Improvement of Anil K Sarje's Authentication Scheme over Insecure Networks
    Sekhar, Vorugunti Chandra
    Sarvabhatla, Mrudula
    [J]. 2013 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2013,
  • [5] Cryptanalysis of a remote password authentication scheme
    Chan, CK
    Cheng, LM
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2001, 78 (03) : 323 - 326
  • [6] Cryptanalysis of an Efficient Password Authentication Scheme
    Pan, Chiu-Shu
    Tsai, Cheng-Yi
    Tsaur, Shyh-Chang
    Hwang, Min-Shiang
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2016, : 743 - 748
  • [7] CRYPTANALYSIS OF A PASSWORD AUTHENTICATION SCHEME USING QUADRATIC RESIDUES
    CHANG, CC
    WU, TC
    LAIH, CS
    [J]. COMPUTER COMMUNICATIONS, 1995, 18 (01) : 45 - 47
  • [8] Cryptanalysis of a timestamp-based password authentication scheme
    Chan, CK
    Cheng, LM
    [J]. COMPUTERS & SECURITY, 2002, 21 (01) : 74 - 76
  • [9] Cryptanalysis and Enhancement of a Password-Based Authentication Scheme
    Eldefrawy, Mohamed H.
    Al-Muhtadi, Jalal F.
    [J]. 2015 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2015, : 548 - 551
  • [10] Further cryptanalysis of a password authentication scheme with smart cards
    Sun, HM
    Yeh, HT
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2003, E86B (04) : 1412 - 1415