An Improvement of SPLICE/AS in WIDE against Guessing Attack

نویسندگان

  • Min-Shiang Hwang
  • Cheng-Chi Lee
  • Yuan-Liang Tang
چکیده

Yamaguchi, Okayama, and Miyahara proposed a simple but efficient authentication system, SPLICE/AS. In this article, we show that their method is vulnerable to the guessing attack. An attacker can obtain the password, private-key, and public-key of the user. To overcome the vulnerability of SPLICE/AS to the guessing attack, we propose an improvement of their system. In our scheme, we not only prevent the guessing attack to obtain secret messages but also enhance the security of the SPLICE/AS authentication system in WIDE.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Improvement on Remote User Authentication Schemes Using Smart Cards

In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their claims were such that their schemes defended against ID-theft attacks, reply attacks, undetectable on-line password guessing attacks, off-line password guessing attacks, user impersonation attack, server counterfeit attack and man-in-the-middle attack. In this paper, we show that Yeh et al.’s sch...

متن کامل

Neural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks

Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...

متن کامل

The Improvement of YSYCT Scheme for Imbalanced Wireless Network

Recently, Yeh et al. proposed an improved password authenticated key exchange scheme (YSYCT scheme) which is secure against undetectable on-line password guessing attacks and provides the explicit key authentication. In this article, readers can understand that the YSYCT scheme still is insecure and the user’s password can be exposed by man-in-the-middle attack. Besides, an improved protocol is...

متن کامل

Modelling the security of recognition-based graphical password schemes

Recognition-based graphical passwords are a suggested alternative authentication mechanism which have received substantial attention in research literature. The literature often presents new schemes, usability studies or propose countermeasures for specific attacks. Whilst this is beneficial, it does not allow for consistent comparison of the security of recognition-based graphical password sch...

متن کامل

Stability Improvement of Immobilized a-amylase using Nano Pore Zeolite

Background: Enzyme engineering by immobilization techniques has proven to be well compatible with the other chemical or biological approaches aiming to improve enzyme’s functions and stability. Zeolites are porous alumino-silicates with a wide range of porosity and particle size along with the other remarkable properties such as high surface area, high stability against a wide range temperature...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Informatica, Lith. Acad. Sci.

دوره 12  شماره 

صفحات  -

تاریخ انتشار 2001