Comments on four multi-server authentication protocols using smart card
نویسندگان
چکیده
Recently, researchers have proposed several nice multi-server authentication protocols. They claim that their protocols are secure and can withstand various attacks. However, after reviewing their schemes, we found that they although are perfect whereas flawed. Due to this observation, in this paper, we list the weakness found in these recent literatures.
منابع مشابه
Comments on Three Multi-Server Authentication Protocols
Recently, Tsai et al., Liao et al. and Li et al. each proposed a multi-server authentication protocol. They claimed their protocols are secure and can withstand various attacks. However, we found some security loopholes in each of their schemes, for example, both Tsai et al.’s and Liao et al.‘s schemes suffers from server spoofing attack by an insider server. Li et al.s’ suffers from the lost s...
متن کاملA Password and Smart Card Based User Authentication Mechanism for Multi-Server Environments
Secure user authentication without repeating registration is one of the important issues in multi-server networks that needs to be adequately addressed. Recently, two-factor (smart card and password) based remote user authentication protocols have been widely introduced due to their low constructional cost and convenient usability for the authentication purpose. In 2011, Chang and Cheng propose...
متن کاملTwo Improved Multi-server Authentication Protocols Based on Hash Function and Smart Card
To use the network services provided by multiple servers in mobile wireless network, recently, Tsai proposed a hash function and smart card based multi-server authentication protocol. Chen et al. showed that Tsai’s scheme cannot resist the server spoofing attack, and proposed a novel one. In this paper, we show that Chen et al.’s protocol cannot resist off-line password guessing attacks, and pr...
متن کاملSecurity weaknesses in two multi-server password based authentication protocols
In 2004 and 2005, Tsaur et al. proposed a smart card based password authentication schemes for multi-server environments, respectively. They claimed that their protocols are safe and can withstand various kinds of attacks. However, after analysis, we found their schemes each have some secure loopholes. In this article, we will show the security flaws in these two protocols.
متن کاملOn the Usability of Two-Factor Authentication
Smart-card-based password authentication, known as twofactor authentication, is one of the most widely used security mechanisms to validate the legitimacy of a remote client, who must hold a valid smart card and the correct password in order to successfully login the server. So far the research on this domain has mainly focused on developing more secure, privacy-preserving and efficient protoco...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2012 شماره
صفحات -
تاریخ انتشار 2012