Cryptanalysis of a timestamp-based password authentication scheme

被引:0
|
作者
Chan, CK [1 ]
Cheng, LM [1 ]
机构
[1] City Univ Hong Kong, Dept Elect Engn, Kowloon, Hong Kong, Peoples R China
关键词
password authentication; smart card; ID-based scheme; cryptanalysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a cryptanalysis of a timestamp-based password authentication scheme which is based on the concepts of ID. based schemes and smart cards. We show that the scheme is breakable. An intruder is able to construct forged login request from intercepted login requests and then he can impersonate other legal users and pass the system authentication.
引用
收藏
页码:74 / 76
页数:3
相关论文
共 50 条
  • [1] Cryptanalysis of a timestamp-based password authentication scheme
    Chan, Chi-Kwong
    Cheng, L.M.
    Computers and Security, 2001, 21 (01): : 74 - 76
  • [2] Cryptanalysis of an enhanced timestamp-based password authentication scheme
    Wang, B
    Li, JH
    Tong, ZP
    COMPUTERS & SECURITY, 2003, 22 (07) : 643 - 645
  • [3] An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement
    Kumari, Saru
    Gupta, Mridul K.
    Khan, Muhammad Khurram
    Li, Xiong
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1921 - 1932
  • [4] Timestamp-based Password Authentication Scheme
    Ismail, E. S.
    Syed-Musa, S. M. S.
    PROCEEDING OF THE 25TH NATIONAL SYMPOSIUM ON MATHEMATICAL SCIENCES (SKSM25): MATHEMATICAL SCIENCES AS THE CORE OF INTELLECTUAL EXCELLENCE, 2018, 1974
  • [5] Enhancement of a timestamp-based password authentication scheme
    School of Electronics and Information Engineering, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
    Beijing Hangkong Hangtian Daxue Xuebao, 2007, 5 (577-579):
  • [6] An enhancement of timestamp-based password authentication scheme
    Fan, L
    Li, JH
    Zhu, HW
    COMPUTERS & SECURITY, 2002, 21 (07) : 665 - 667
  • [7] Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards
    Yang, CC
    Yang, HW
    Wang, RC
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 578 - 579
  • [8] Security improvement on a timestamp-based password authentication scheme
    Wang, YJ
    Li, JH
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 580 - 582
  • [9] Cryptanalysis of timestamp-based password authentication schemes using smart cards
    Wang, Guilin
    Bao, Feng
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 399 - +
  • [10] Cryptanalysis of "An Improved Timestamp-Based Remote User Authentication Scheme"
    Kumari, Saru
    Gupta, Mridul K.
    Khan, Muhammad Khurram
    Bin Muhaya, Fahad T.
    2012 INTERNATIONAL CONFERENCE ON QUALITY, RELIABILITY, RISK, MAINTENANCE, AND SAFETY ENGINEERING (ICQR2MSE), 2012, : 1439 - 1442