A Simple Attack on a Recently Introduced Hash-Based Secure User Authentication Scheme

被引:0
|
作者
Kim, Minho [1 ]
Koc, Cetin Kaya [2 ]
机构
[1] Oregon State Univ, Sch EECS, Informat Secur Lab, Corvallis, OR 97331 USA
[2] Istanbul Commerce Univ, Informat Secur Res Ctr, TR-34112 Istanbul, Turkey
关键词
Hash function; user authentication; stolen-verifier attack; denial-of-service attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication is an important service in network security. Recently, several user authentication protocols have been proposed. However, a scheme which withstands all known attacks is not yet available. The Lee-Li-Hwang (LLH) authentication scheme [3] was proposed to circumvent the guessing attack in the Peyravian-Zunic (PZ) password scheme [6]. However, Yoon, Ryu, and Yoo (YRY) [9] discovered that the LLH scheme still suffers from the denial of service attack, and proposed an enhancement for the LLH scheme to solve its security problems. More recently, Ku, Chiang, and Chang (KCC) [2] demonstrated that the YRY scheme is vulnerable to the offline guessing and the stolen-verifier attacks. In this paper, we show that the YRY scheme is also vulnerable to the denial-ofservice attack. Furthermore, it was also claimed in [2] that the YRY scheme cannot achieve backward secrecy. We show in this paper that this claim is not entirely valid.
引用
收藏
页码:157 / 160
页数:4
相关论文
共 50 条
  • [1] DePass: A Secure Hash-based Authentication Scheme
    Benzekki, Kamal
    El Fergougui, Abdeslam
    ElAlaoui, Abdelbaki ElBelrhiti
    [J]. 2017 INTELLIGENT SYSTEMS AND COMPUTER VISION (ISCV), 2017,
  • [2] A secure and robust hash-based scheme for image authentication
    Ahmed, Fawad
    Siyal, M. Y.
    Abbas, Vali Uddin
    [J]. SIGNAL PROCESSING, 2010, 90 (05) : 1456 - 1470
  • [3] A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices
    Yoon, Eun-Jim
    Yoo, Kee-Young
    [J]. ADVANCES IN WEB AND NETWORK TECHNOLOGIES, AND INFORMATION MANAGEMENT, PROCEEDINGS, 2007, 4537 : 612 - +
  • [4] A secure user authentication scheme using hash functions
    Yoon, Eun-Jun
    Ryu, Eun-Kyung
    Yoo, Kee-Young
    [J]. Operating Systems Review (ACM), 2004, 38 (02): : 62 - 68
  • [5] Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
    Khan, Muhammad Khurram
    Zhang, Jiashu
    Wang, Xiaomin
    [J]. CHAOS SOLITONS & FRACTALS, 2008, 35 (03) : 519 - 524
  • [6] On the Secure Design of Hash-Based Authenticator in the Smartcard Authentication System
    Byun, Jin Wook
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (04) : 2329 - 2352
  • [7] On the Secure Design of Hash-Based Authenticator in the Smartcard Authentication System
    Jin Wook Byun
    [J]. Wireless Personal Communications, 2019, 109 : 2329 - 2352
  • [8] Secure Hash-Based Password Authentication Protocol Using Smartcards
    Jung, Hyunhee
    Kim, Hyun Sung
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2011, PT V, 2011, 6786 : 593 - 606
  • [9] Robust and Secure Video Authentication: A Hash-Based Watermarking Approach
    Saini, Preeti
    Ahuja, Rakesh
    [J]. IAENG International Journal of Computer Science, 2024, 51 (09) : 1291 - 1308
  • [10] A secure and lightweight hash-based mutual authentication scheme in fog-assisted healthcare network
    Verma, Upendra
    Gianey, Hemant Kumar
    [J]. International Journal of Embedded Systems, 2024, 17 (3-4) : 200 - 212