Cryptanalysis of a User Authentication Protocol

被引:0
|
作者
Tan, Zuowen [1 ]
机构
[1] Jiangxi Univ Finance & Econ, Sch Informat Technol, Nanchang City 330013, Jiangxi, Peoples R China
关键词
authentication; password; identity-based; impersonation attack; KEY EXCHANGE PROTOCOL; INSECURE NETWORKS; SECURITY; IMPROVEMENT; ACCESS; SCHEME;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, Peyravin and Jeffries proposed a password-based practical authentication scheme using one-way collision-resistant hash functions. However, Shim and Munilla independently showed that the scheme is vulnerable to off-line guessing attacks. Holbl, Welzer and Brumenn presented an improved password-based protocols. In the paper, we showed that the improved scheme still suffers from off-line guessing attacks on user authentication protocol and Denial-of-Service attacks on password change protocol.
引用
收藏
页码:27 / 30
页数:4
相关论文
共 50 条
  • [21] Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Yoon, Eun-Jun
    Yoo, Kee-Young
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (06): : 1687 - 1689
  • [22] Cryptanalysis on Improved Remote User Authentication Scheme Preserving User Anonymity
    Lee, Sung-Woon
    Kwon, Hyuck-Jin
    Kim, Hyun-Sung
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (10): : 21 - 24
  • [23] Cryptanalysis of 'A novel user-participating authentication scheme'
    Choudhury, Amlan Jyoti
    Sain, Mangal
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), 2017, : 963 - 967
  • [24] Cryptanalysis of Lightweight User Authentication Scheme Using Smartcard
    Kang, Dongwoo
    Jung, Jaewook
    Yang, Hyungkyu
    Choi, Younsung
    Won, Dongho
    ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, 2018, 593 : 78 - 84
  • [25] Cryptanalysis of Remote User Authentication Scheme with key agreement
    Madhusudan, R.
    Valiveti, Annapurna
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2015,
  • [26] Cryptanalysis of the end-to-end security protocol for mobile communications with end-user identification/authentication
    Zhou, YB
    Zhang, ZF
    Feng, DG
    IEEE COMMUNICATIONS LETTERS, 2005, 9 (04) : 372 - 374
  • [27] Cryptanalysis on dynamic authentication protocol for personal communication system
    Chien, HY
    Chen, YH
    Jan, JK
    Tseng, YM
    ELECTRONICS LETTERS, 2001, 37 (14) : 895 - 896
  • [28] Cryptanalysis of a hybrid authentication protocol for large mobile networks
    Tang, QA
    Mitchell, CJ
    JOURNAL OF SYSTEMS AND SOFTWARE, 2006, 79 (04) : 496 - 501
  • [29] Cryptanalysis of the LMAP Protocol: A Low-cost RFID Authentication Protocol
    Li, Jing
    Zhou, Zhiping
    Wang, Ping
    2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2017, : 7292 - 7297
  • [30] Cryptanalysis of an RFID-Enabled Authentication Protocol for Healthcare
    Ghosh, Haradhan
    Maurya, Pramod Kumar
    Bagchi, Satya
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 138 (04) : 2613 - 2635