Dictionary attack of remote user authentication scheme using side channel analysis
نویسندگان
چکیده
منابع مشابه
Remote User Authentication Scheme with User Anonymity
This paper proposes a scheme allowing a user to log into the server with a dynamic pseudonym. No one can trace the specified user except the service provider, which protects the user privacy from outsiders in this way. Besides, the scheme provides the following merits: (1) no verification table; (2) mutual authentication; (3) low communication and computation cost; (4) free password change; (5)...
متن کاملImpersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards
Recently, Das et al. proposed a dynamic ID-based verifierfree password authentication scheme using smart cards. To resist the IDtheft attack, the user’s login ID is dynamically generated and one-time used. Herein, we demonstrate that Das et al.’s scheme is vulnerable to an impersonation attack, in which the adversary can easily impersonate any user to login the server at any time. Furthermore, ...
متن کاملAn Enhanced Remote User Authentication Scheme
Remote user authentication schemes are used to verify the legitimacy of remote users’ login request. Recently, several dynamic user authentication schemes have been proposed. It can be seen that, these schemes have weaknesses because of using timestamps. The implement of strict and safe time synchronization is very difficult and increases network overhead. In this paper, we propose a new dynami...
متن کاملSecurity Analysis on a Timestamp-based Remote User Authentication Scheme
In recent years, many password-based remote user authentication schemes have been presented. In 2003, Shen et al. proposed a timestamp-based password authentication scheme using smart cards. In their scheme, the server does not need to maintain any verification table and only stores a secret key. However, Awasthi et al. found that Shen et al.’s scheme is vulnerable to impersonation attacks with...
متن کاملA Remote User Authentication Scheme using Bilinear Pairings
In 2006, Das et al. [6] proposed a novel remote user authentication scheme using bilinear pairings. In that scheme, the remote system receives user login request and allows login to the legitimate user. In this paper we present the cryptanalysis of the Das et al. scheme and propose an improved and more secure scheme that enables user to choose and change their password without the help of the r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Broadcast Engineering
سال: 2008
ISSN: 1226-7953
DOI: 10.5909/jbe.2008.13.1.62