Quantum password authentication against man-in-the-middle attack

نویسنده

  • E. Karpov
چکیده

Authentication with recently proposed quantum password protocol is secure against impersonation. Here we show that original version of the protocol is not secure against active malicious prover and verifier, however a slight modification provides a possibility for a legitimate party to detect the attacks. The password is reusable in the absence of the attacks. Otherwise the security of the authentication scheme should be provided by password change. In this way the overall scheme becomes resistant to man-in-the-middle attack.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Remark on the One-Time Password Authentication Protocol against Theft Attacks

Recently, Tsuji and Shimizu proposed a one-time password authentication protocol against replay and theft attacks to protect the stolen-verifier problem or other steal attacks on the Internet server. Unfortunately, in this paper, we show that their scheme is also insecure under the middle attack. Their scheme is also not secure under the middle attack. keywords: password authentication, one-tim...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

The Improvement of YSYCT Scheme for Imbalanced Wireless Network

Recently, Yeh et al. proposed an improved password authenticated key exchange scheme (YSYCT scheme) which is secure against undetectable on-line password guessing attacks and provides the explicit key authentication. In this article, readers can understand that the YSYCT scheme still is insecure and the user’s password can be exposed by man-in-the-middle attack. Besides, an improved protocol is...

متن کامل

An Improvement of Liou et al.'s Authentication Scheme using Smart Cards

In 2004, Das et al. proposed a dynamic identity based remote user authentication scheme. This scheme allows the users to choose and change their passwords freely and the server does not maintain any verification table. Das et al. claimed that their scheme is secure against stolen verifier attack, replay attack, forgery attack, dictionary attack, insider attack and identity theft. Unfortunately,...

متن کامل

A Novel Smart Card Authentication Scheme using Image Watermarking

One of the primary issues of information technology and communication is the security of information from unwanted frauds. For every transaction over insecure channel authentication is required. Since the rise of the Internet smart card authentication schemes have been widely used to avoid the problems related to traditional password based authentication schemes. However, most of the smart card...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016