Cryptanalysis of a User Authentication Protocol

被引:0
|
作者
Tan, Zuowen [1 ]
机构
[1] Jiangxi Univ Finance & Econ, Sch Informat Technol, Nanchang City 330013, Jiangxi, Peoples R China
关键词
authentication; password; identity-based; impersonation attack; KEY EXCHANGE PROTOCOL; INSECURE NETWORKS; SECURITY; IMPROVEMENT; ACCESS; SCHEME;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, Peyravin and Jeffries proposed a password-based practical authentication scheme using one-way collision-resistant hash functions. However, Shim and Munilla independently showed that the scheme is vulnerable to off-line guessing attacks. Holbl, Welzer and Brumenn presented an improved password-based protocols. In the paper, we showed that the improved scheme still suffers from off-line guessing attacks on user authentication protocol and Denial-of-Service attacks on password change protocol.
引用
收藏
页码:27 / 30
页数:4
相关论文
共 50 条
  • [1] Cryptanalysis of a Remote User Authentication Protocol Using Smart Cards
    Madhusudhan, R.
    Kumar, Rohith S.
    2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, : 474 - 477
  • [2] Cryptanalysis of an authentication protocol
    Groza, B
    Petrica, D
    Seventh International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, Proceedings, 2005, : 147 - 153
  • [3] Cryptanalysis of a Multifactor Authentication Protocol
    Likitha, Soorea
    Saravanan, R.
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1, 2019, 707 : 35 - 42
  • [4] Cryptanalysis of a Robust and Efficient Smart Card Oriented Remote User Authentication Protocol
    Horng, Wen-Bing
    Peng, Jian-Wen
    Liu, Chao-Sheng
    Chiu, Ying-Ching
    IEEE INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATIONS SYSTEMS (ISPACS 2012), 2012,
  • [5] Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification
    Wang, Xu An
    Weng, Jian
    Ma, Jianfeng
    Yang, Xiaoyuan
    INFORMATION SCIENCES, 2019, 488 : 13 - 18
  • [6] Cryptanalysis of the User Authentication Scheme with Anonymity
    Jeon, Woongryul
    Kim, Jeeyeon
    Nam, Junghyun
    Lee, Youngsook
    Won, Dongho
    FUTURE GENERATION INFORMATION TECHNOLOGY, 2011, 7105 : 285 - +
  • [7] Cryptanalysis of a remote user authentication scheme
    Wang, Bangju
    Zhang, Huanguo
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1699 - 1701
  • [8] Cryptanalysis of the LCSS RFID Authentication Protocol
    Cao, Tianjie
    Shen, Peng
    Bertino, Elisa
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 305 - +
  • [9] Recursive Cryptanalysis of the IoT Authentication Protocol
    Najam-ul-Islam, Muhammad
    Khalid, Madiha
    Park, Hyesung
    Khokhar, Umar
    2019 IEEE 1ST GLOBAL POWER, ENERGY AND COMMUNICATION CONFERENCE (GPECOM2019), 2019, : 1 - 4
  • [10] Cryptanalysis of the shifted conjugacy authentication protocol
    Longrigg, Jonathan
    Ushakov, Alexander
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2008, 2 (02) : 109 - 116