Cryptanalysis of a timestamp-based password authentication scheme

被引:0
|
作者
Chan, CK [1 ]
Cheng, LM [1 ]
机构
[1] City Univ Hong Kong, Dept Elect Engn, Kowloon, Hong Kong, Peoples R China
关键词
password authentication; smart card; ID-based scheme; cryptanalysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a cryptanalysis of a timestamp-based password authentication scheme which is based on the concepts of ID. based schemes and smart cards. We show that the scheme is breakable. An intruder is able to construct forged login request from intercepted login requests and then he can impersonate other legal users and pass the system authentication.
引用
收藏
页码:74 / 76
页数:3
相关论文
共 50 条
  • [31] CRYPTANALYSIS OF A PASSWORD AUTHENTICATION SCHEME USING QUADRATIC RESIDUES
    CHANG, CC
    WU, TC
    LAIH, CS
    COMPUTER COMMUNICATIONS, 1995, 18 (01) : 45 - 47
  • [32] Cryptanalysis of a password authentication scheme over insecure networks
    Xiang, Tao
    Wong, Kwok-Wo
    Liao, Xiaofeng
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2008, 74 (05) : 657 - 661
  • [33] Further cryptanalysis of a password authentication scheme with smart cards
    Sun, HM
    Yeh, HT
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2003, E86B (04) : 1412 - 1415
  • [34] Cryptanalysis of 'An Improved Remote Password Authentication Scheme with Smartcard'
    Khan, Muhammad Khurram
    He, Debiao
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1708 - 1710
  • [35] A secure and timestamp-based communication scheme for cloud environment
    Salim, Abu
    Tripathi, Sachin
    Tiwari, Rajesh Kumar
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (04) : 319 - 332
  • [36] Cryptanalysis of a Sensor Smart Card Based Password Authentication Scheme with User Anonymity
    Cao, Tianjie
    Huang, Shi
    SENSOR LETTERS, 2013, 11 (11) : 2149 - 2151
  • [37] Cryptanalysis of flexible remote password authentication scheme of ICN'01
    Kim, S
    Lim, S
    Won, D
    ELECTRONICS LETTERS, 2002, 38 (24) : 1519 - 1520
  • [38] Cryptanalysis of Enhancements of a Password Authentication Scheme over Insecure Networks
    Kumar, Manoj
    Gupta, Mridul Kumar
    Kumari, Saru
    CONTEMPORARY COMPUTING, 2011, 168 : 524 - +
  • [39] Cryptanalysis of a Shoulder-Surfng Resistant Password Authentication Scheme
    Tsaur, Maw-Jinn
    Lue, Chung-Chia
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SERVICE SYSTEM (CSSS), 2014, 109 : 274 - 276
  • [40] Cryptanalysis of Password Authentication System
    Aboud, Sattar J.
    Al-fayoumi, Mohammad
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2014, : 14 - 17