Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards(Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
A remote user authentication scheme is a two-party protocol whereby an authentication server in a distributed system confirms the identity of a remote individual logging on to the server over an untrusted, open network. Recently, Lee et al. have proposed an efficient nonce-based scheme for remote user authentication using smart cards. This work reviews Lee et al.'s authentication scheme and provides a security analysis on the scheme. Our analysis shows that Lee et al.'s scheme does not achieve its basic aim of authenticating remote users and furthermore has a very hazardous method for changing passwords. In addition, we recommend some changes to the scheme so that it can attain at least its main security goal.
- 社団法人電子情報通信学会の論文
- 2007-01-01
著者
-
Park Sangjoon
Information Security Group Sungkyunkwan University
-
NAM Junghyun
Information Security Group, Sungkyunkwan University
-
KIM Seungjoo
Information Security Group, Sungkyunkwan University
-
WON Dongho
Information Security Group, Sungkyunkwan University
-
Won Dongho
Information Security Group Sungkyunkwan University
-
Won Dongho
Sungkyunkwan Univ. Gyeonggi‐do Kor
-
Nam Junghyun
Information Security Group Sungkyunkwan University
-
Kim Seungjoo
Information Security Group Sungkyunkwan University
関連論文
- Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards(Information Security)
- Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme(Protocol, Cryptography and Information Security)
- Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Passwords(Protocol, Cryptography and Information Security)
- Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol(Digital Signal Processing)