Security analysis on the authentication mechanisms of Korean popular messengers

被引:0
|
作者
Shin, Donghwi [1 ]
Choi, Youngsung [1 ]
Lee, Yunho [1 ]
Park, Sangjoon [1 ]
Kim, Seungjoo [1 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Informat Secur Grp, 300 Cheoncheon Dong, Suwon 440746, Gyeonggi Do, South Korea
来源
UNIVERSAL ACCESS IN HUMAN COMPUTER INTERACTION: COPING WITH DIVERSITY, PT 1 | 2007年 / 4554卷
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The "NateOn" messenger is the most popular messenger in Korea (It has 17,160,000 users in Korea). In this paper, we will analyze the security of authentication mechanism of the NateOn. We will show that the "NateOn Ver 3.5.15.0(600)" is very vulnerable to the replay attack and the dictionary attack. Furthermore, we will show that other messengers such as "BuddyBuddy Ver 5.8" (It has 5,980,000 users in Korea), "Daum Touch Ver 5.06101300" (It has 2,384,000 users in Korea), etc. have the similar security problems.
引用
收藏
页码:547 / +
页数:2
相关论文
共 50 条
  • [31] Security analysis of practical anonymous user authentication scheme with security proof
    Liu, Chenglian
    Lin, Changlu
    Sun, Shuliang
    Information Technology Journal, 2013, 12 (03) : 522 - 525
  • [32] Sweet-Spotting Security and Usability for Intelligent Graphical Authentication Mechanisms
    Belk, Marios
    Pamboris, Andreas
    Fidas, Christos
    Katsini, Christina
    Avouris, Nikolaos
    Samaras, George
    2017 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE (WI 2017), 2017, : 252 - 259
  • [33] Cyber Physical Security Protection in Online Authentication Mechanisms for Banking Systems
    Jama, Ahmed Yousuf
    Gucluoglu, Tansal
    Siraj, Maheyzah Md
    INTELLIGENT COMPUTING, VOL 2, 2019, 857 : 1021 - 1031
  • [34] Implementation of the security system for instant messengers
    Kim, S
    Leem, CS
    COMPUTATIONAL AND INFORMATION SCIENCE, PROCEEDINGS, 2004, 3314 : 739 - 744
  • [35] Korean Popular Beliefs
    Kim, Dong Kyu
    JOURNAL OF KOREAN RELIGIONS, 2016, 7 (02) : 179 - 182
  • [36] Security analysis of two lightweight RFID authentication protocols
    Wang Shao-hui
    Han Zhijie
    Liu Sujuan
    Chen Dan-wei
    annals of telecommunications - annales des télécommunications, 2014, 69 : 273 - 282
  • [37] A RFID Mutual Authentication Security Protocol Design and Analysis
    Liang, Xiaobing
    Lv, Yingjie
    Zhao, Bing
    Liu, Ying
    Sun, Zhiqiang
    Cen, Wei
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 508 - 512
  • [38] Security analysis of authentication scheme with anonymity for wireless environments
    Wei, Yongzhuang
    Qiu, Hongbing
    Hu, Yupu
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 535 - +
  • [39] Security Analysis of Speech Perceptual Hashing Authentication Algorithm
    Zhang Qiu-yu
    Ren Zhan-wei
    Xing Peng-fei
    Huang Yi-bo
    Yu Shuang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 103 - 118
  • [40] Design and Security Analysis of Mobile Identity Authentication Protocol
    Wang Qin
    Zhi Fenhe
    Ao Jinghai
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 2645 - 2649