Cryptanalysis of Security Analysis and Enhancements of a Remote User Authentication Scheme

被引:0
|
作者
Hwang, Min-Shiang [1 ,2 ]
Yang, Hung-Wei [1 ]
Yang, Cheng-Ying [3 ]
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[2] China Med Univ, China Med Univ Hosp, Dept Med Res, Taichung 40402, Taiwan
[3] Univ Taipei, Dept Comp Sci, Taipei, Taiwan
关键词
D O I
10.1088/1757-899X/719/1/012004
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The main purpose of user authentication schemes is to verify the authorized user using a server via an insecure channel. With the authentication, a server and a user could have a mutual authentication. In 2019, Cao proposed an improvement of a user authentication scheme. The scheme was postulated in that it could protect from the several possible attacks and have the following advantages: Identity preservation, not only to resist the slow wrong password detection, to resist the user masquerading, the password guessing, and the sever masquerading attacks, but also to have a mutual authentication between servers and users. However, we will show his scheme is not with the capacity to against the denial of service and on-line password guessing attacks in this article. In order to improve that authentication scheme, this work proposes an enhanced remote authentication scheme with the capacity to resist those vulnerabilities as shown in Cao-Sun-Cao's scheme.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Security analysis and enhancements of a remote user authentication scheme
    Cao, Shou-Qi
    Sun, Qing
    Cao, Li-Ling
    [J]. International Journal of Network Security, 2019, 21 (04) : 661 - 669
  • [2] Security Analysis and Enhancements of a User Authentication Scheme
    Liu, Wan-Rong
    He, Xin
    Ji, Zhi-Yong
    [J]. International Journal of Network Security, 2021, 23 (05): : 895 - 903
  • [3] Security enhancements of a remote user authentication scheme preserving user anonymity
    An, Younghwa
    Yang, Hyungkyu
    [J]. International Journal of Multimedia and Ubiquitous Engineering, 2013, 8 (01): : 129 - 138
  • [4] Cryptanalysis of a remote user authentication scheme
    Wang, Bangju
    Zhang, Huanguo
    [J]. ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1699 - 1701
  • [5] Cryptanalysis and improvement of a remote user authentication scheme
    Ou Qingyu
    Huang Kai
    Li Guang
    [J]. ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL IV, PROCEEDINGS, 2009, : 49 - +
  • [6] Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards
    WANG DingMA Chunguang College of Computer Science and TechnologyHarbin Engineering UniversityHarbin China Automobile Management Institute of PLABengbu China
    [J]. The Journal of China Universities of Posts and Telecommunications, 2012, 19 (05) : 104 - 114
  • [8] Security Enhancements of an Improved Timestamp-Based Remote User Authentication Scheme
    An, Younghwa
    [J]. COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 54 - 61
  • [9] Cryptanalysis of Remote User Authentication Scheme with key agreement
    Madhusudan, R.
    Valiveti, Annapurna
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2015,
  • [10] Cryptanalysis on Improved Remote User Authentication Scheme Preserving User Anonymity
    Lee, Sung-Woon
    Kwon, Hyuck-Jin
    Kim, Hyun-Sung
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (10): : 21 - 24