Cryptanalysis of Password Authentication System

被引:0
|
作者
Aboud, Sattar J. [1 ]
Al-fayoumi, Mohammad [2 ]
机构
[1] Univ Bedfordshire, Dept Comp Sci & Technol, Luton, Beds, England
[2] Al Isra Univ, Fac Informat Technol, Amman, Jordan
关键词
SMART CARDS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
the password authentication systems have been increasing in recent years. Therefore authors have been concentrated these days on introducing more password authentication systems. Thus, in 2011, Lee et al., presented an enhanced system to resolve the vulnerabilities of selected system. But, we notice that Lee et al., system is still weak to server attack and stolen smart card attack. Also, a password change protocol of the system is neither suitable to users nor low efficient. There is no handy data can be gained from the values kept in smart cards. Therefore, a stolen smart card attack can be blocked. To prevent server attack, we suggest transferring a user authentication operation from servers to a registration centre, which can guarantee every server, has another private key.
引用
收藏
页码:14 / 17
页数:4
相关论文
共 50 条
  • [31] Cryptanalysis of Yang-Wang-Chang's password authentication scheme with smart cards
    Pathan, Al-Sakib Khan
    Hong, Choong Seon
    10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 1618 - 1620
  • [32] Cryptanalysis of two ID based password authentication schemes for multi-server environments
    Tan Z.
    International Journal of Digital Content Technology and its Applications, 2011, 5 (01) : 87 - 94
  • [33] An intrusion-tolerant password authentication system
    Wang, XH
    Heydari, MH
    Lin, H
    19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 110 - 118
  • [34] Alignment based graphical password authentication system
    Danish, Abutalha
    Sharma, Labhya
    Varshney, Harshit
    Khan, Asad Mohammed
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2950 - 2954
  • [35] Cryptanalysis of Password Protection of Oracle Database Management System (DBMS)
    Koishibayev, Timur
    Umarova, Zhanat
    4TH INTERNATIONAL CONFERENCE ON SCIENCE & ENGINEERING IN MATHEMATICS, CHEMISTRY AND PHYSICS 2016 (SCIETECH 2016), 2016, 710
  • [36] Cryptanalysis and Improvement on Lee-Chen's One-Time Password Authentication Scheme
    Lin, Chun-Li
    Hung, Ching-Po
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2008, 2 (02): : 1 - 8
  • [37] Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update
    Li, Xiong
    Niu, Jianwei
    Liao, Junguo
    Liang, Wei
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (02) : 374 - 382
  • [38] Cryptanalysis of Yeh-Shen-Hwang's one-time password authentication scheme
    Yum, DH
    Lee, PJ
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (04) : 1647 - 1648
  • [39] Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards
    He, Debiao
    Wang, Ding
    Wu, Shuhua
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (02): : 170 - 177
  • [40] Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'
    Kumari, Saru
    Khan, Muhammad Khurram
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 3939 - 3955