Cryptanalysis of a User Authentication Protocol

被引:0
|
作者
Tan, Zuowen [1 ]
机构
[1] Jiangxi Univ Finance & Econ, Sch Informat Technol, Nanchang City 330013, Jiangxi, Peoples R China
关键词
authentication; password; identity-based; impersonation attack; KEY EXCHANGE PROTOCOL; INSECURE NETWORKS; SECURITY; IMPROVEMENT; ACCESS; SCHEME;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, Peyravin and Jeffries proposed a password-based practical authentication scheme using one-way collision-resistant hash functions. However, Shim and Munilla independently showed that the scheme is vulnerable to off-line guessing attacks. Holbl, Welzer and Brumenn presented an improved password-based protocols. In the paper, we showed that the improved scheme still suffers from off-line guessing attacks on user authentication protocol and Denial-of-Service attacks on password change protocol.
引用
收藏
页码:27 / 30
页数:4
相关论文
共 50 条
  • [41] Cryptanalysis of a user friendly remote authentication scheme with smart cards
    Yang, CC
    Wang, RC
    COMPUTERS & SECURITY, 2004, 23 (05) : 425 - 427
  • [42] Cryptanalysis of Security Analysis and Enhancements of a Remote User Authentication Scheme
    Hwang, Min-Shiang
    Yang, Hung-Wei
    Yang, Cheng-Ying
    3RD ANNUAL INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING, 2020, 719
  • [43] Cryptanalysis and Improvement of A Mutual User Authentication Scheme for the Internet of Things
    Limbasiya, Trupil
    Karati, Arijit
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 168 - 173
  • [44] Cryptanalysis and Improvement of User Authentication Scheme Based on Rabin Cryptosystem
    Kang, Dongwoo
    Lee, Hakjun
    Won, Dongho
    Lee, Youngsook
    PROCEEDINGS OF THE 2020 14TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM), 2020,
  • [45] Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol
    Sun, Da-Zhi
    Zhong, Ji-Dong
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) : 1085 - 1093
  • [46] Cryptanalysis and Improvement of a Novel RFID Authentication Protocol for Medical Systems
    Xiao, Feng
    Hu, Xi
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2025, 19 (02): : 589 - 611
  • [47] Cryptanalysis of Resource Constraint IoT Network Authentication Protocol RAPP
    Khan, Osman
    Khalid, Madiha
    Mujahid, Umar
    Najam-ul-Islam, M.
    PROCEEDINGS OF 2021 INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGIES (IBCAST), 2021, : 708 - 713
  • [48] Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems
    Abyaneh, Mohammad Reza Sohizadeh
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 92 - 103
  • [49] Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks
    He, Debiao
    Zhang, Yuanyuan
    Chen, Jianhua
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 74 (02) : 229 - 243
  • [50] Cryptanalysis of A Secure and Lightweight Authentication Protocol for Wearable Devices Environment
    Kumar, Devender
    Grover, Harmanpreet Singh
    Adarsh
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 1063 - 1068