The Password Change Phase is Still Insecure
نویسنده
چکیده
In 2004, W. C. Ku and S. M. Chen proposed an efficient remote user authentication scheme using smart cards to solve the security problems of Chien et al.’s scheme. Recently, Hsu and Yoon et al. pointed out the security weaknesses of the Ku and Chen’s scheme Furthermore, Yoon et al. also proposed a new efficient remote user authentication scheme using smart cards. Yoon et al. also modified the password change phase of Ku and Chen’s scheme. This paper analyzes that password change phase of Yoon et al’s modified scheme is still insecure.
منابع مشابه
The Password Change Phase Is Still Unsecure
Yoon et al. proposed a new efficient remote user authentication scheme using smart cards in 2004. This paper analyzes the proposed scheme and then proves that the password change phase of Yoon et al’s scheme is still insecure.
متن کاملSecurity Analysis of a Remote User Authentication Scheme with Smart Cards
Yoon et al. proposed a new efficient remote user authentication scheme using smart cards to solve the security problems of W. C. Ku and S. M. Chen’s scheme. This paper reviews Yoon et al.’s scheme and then proves that the password change phase of Yoon et al’s scheme is still insecure. This paper also proves that the Yoon et al. is still vulnerable to parallel session attack.
متن کاملAnalysis and Improvement of a User Authentication Improved Protocol
Remote user authentication always adopts the method of password to login the server within insecure network environments. Recently, Peyravin and Jeffries proposed a practical authentication scheme based on oneway collision-resistant hash functions. However, Shim and Munilla independently showed that the scheme is vulnerable to off-line guessing attacks. In order to remove the weakness, Hölbl, W...
متن کاملCryptanalysis of a Novel Remote User Authentication Scheme
In 2005, Manik et al. [5] propose a novel remote user authentication scheme using bilinear pairings which allows a valid user to login to the remote system but prohibits too many users to login with the same login-ID. It also provides a flexible password change function. In the same year Chou et al.’s [3] proposed an impersonation attack on their user authentication scheme and also proposed the...
متن کاملCryptanalysis on Chang-Yang-Hwang Protected Password Change Protocol
Recently, Chang et al. proposed an authenticated key agreement and protected password change scheme. They claimed that their scheme is simple and efficient. However, in this letter we point out that their protected password change protocol is insecure under the denial-of-service attack and the dictionary attack in some situations.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره cs.CR/0409004 شماره
صفحات -
تاریخ انتشار 2004