Quantum password authentication against man-in-the-middle attack
نویسنده
چکیده
Authentication with recently proposed quantum password protocol is secure against impersonation. Here we show that original version of the protocol is not secure against active malicious prover and verifier, however a slight modification provides a possibility for a legitimate party to detect the attacks. The password is reusable in the absence of the attacks. Otherwise the security of the authentication scheme should be provided by password change. In this way the overall scheme becomes resistant to man-in-the-middle attack.
منابع مشابه
Remark on the One-Time Password Authentication Protocol against Theft Attacks
Recently, Tsuji and Shimizu proposed a one-time password authentication protocol against replay and theft attacks to protect the stolen-verifier problem or other steal attacks on the Internet server. Unfortunately, in this paper, we show that their scheme is also insecure under the middle attack. Their scheme is also not secure under the middle attack. keywords: password authentication, one-tim...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملThe Improvement of YSYCT Scheme for Imbalanced Wireless Network
Recently, Yeh et al. proposed an improved password authenticated key exchange scheme (YSYCT scheme) which is secure against undetectable on-line password guessing attacks and provides the explicit key authentication. In this article, readers can understand that the YSYCT scheme still is insecure and the user’s password can be exposed by man-in-the-middle attack. Besides, an improved protocol is...
متن کاملAn Improvement of Liou et al.'s Authentication Scheme using Smart Cards
In 2004, Das et al. proposed a dynamic identity based remote user authentication scheme. This scheme allows the users to choose and change their passwords freely and the server does not maintain any verification table. Das et al. claimed that their scheme is secure against stolen verifier attack, replay attack, forgery attack, dictionary attack, insider attack and identity theft. Unfortunately,...
متن کاملA Novel Smart Card Authentication Scheme using Image Watermarking
One of the primary issues of information technology and communication is the security of information from unwanted frauds. For every transaction over insecure channel authentication is required. Since the rise of the Internet smart card authentication schemes have been widely used to avoid the problems related to traditional password based authentication schemes. However, most of the smart card...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016