Cryptanalysis of a User Authentication Protocol

被引:0
|
作者
Tan, Zuowen [1 ]
机构
[1] Jiangxi Univ Finance & Econ, Sch Informat Technol, Nanchang City 330013, Jiangxi, Peoples R China
关键词
authentication; password; identity-based; impersonation attack; KEY EXCHANGE PROTOCOL; INSECURE NETWORKS; SECURITY; IMPROVEMENT; ACCESS; SCHEME;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, Peyravin and Jeffries proposed a password-based practical authentication scheme using one-way collision-resistant hash functions. However, Shim and Munilla independently showed that the scheme is vulnerable to off-line guessing attacks. Holbl, Welzer and Brumenn presented an improved password-based protocols. In the paper, we showed that the improved scheme still suffers from off-line guessing attacks on user authentication protocol and Denial-of-Service attacks on password change protocol.
引用
收藏
页码:27 / 30
页数:4
相关论文
共 50 条
  • [31] Cryptanalysis of an optimized protocol for mobile network authentication and security
    Laih, CS
    Chiou, SY
    INFORMATION PROCESSING LETTERS, 2003, 85 (06) : 339 - 341
  • [32] Cryptanalysis and improvement of an authentication protocol for wireless sensor networks
    Neerul
    Kumar, Devender
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (05)
  • [33] Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity
    Kim, Seil
    Chun, Ji Young
    Lee, Dong Hoon
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2235 - 2239
  • [34] Further cryptanalysis of 'A user friendly remote user authentication scheme with smart cards'
    Khan, Muhammad Khurram
    ICIET 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND EMERGING TECHNOLOGIES, 2007, : 101 - 105
  • [35] Cryptanalysis of a remote user authentication scheme using smart cards
    Huang Kai
    Ou Qingyu
    Wu Xiaoping
    Song Yexin
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4490 - 4493
  • [36] Cryptanalysis and Improvement of a Two-Factor User Authentication Scheme
    Kumar, Devender
    Chand, Satish
    Kumar, Bijendra
    INFOCOMMUNICATIONS JOURNAL, 2018, 10 (01): : 10 - 14
  • [37] Cryptanalysis of a remote user authentication scheme using smart cards
    Chan, CK
    Cheng, LM
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (04) : 992 - 993
  • [38] Cryptanalysis of a Chaotic Maps-based User Authentication and Key Agreement Protocol for Multi-server Environments
    Zhang, Jiao
    He, Yong
    Liu, Yu-zhen
    Li, Xiong
    INTERNATIONAL CONFERENCE ON ADVANCES IN MANAGEMENT SCIENCE AND ENGINEERING (AMSE 2015), 2015, : 155 - 159
  • [39] CRYPTANALYSIS OF AN EFFICIENT REMOTE USER AUTHENTICATION SCHEME WITH SMART CARDS
    Yeh, Kuo-Hui
    Lo, Nai Wei
    Winata, Enrico
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (06): : 2595 - 2608
  • [40] Cryptanalysis and Improvement of User Authentication Scheme Based on Rabin Cryptosystem
    Kang, Dongwoo
    Lee, Hakjun
    Won, Dongho
    Lee, Youngsook
    Proceedings of the 2020 14th International Conference on Ubiquitous Information Management and Communication, IMCOM 2020, 2020,