메뉴 건너뛰기




Volumn 37, Issue 4, 2003, Pages 26-31

Two simple attacks on Lin-Shen-Hwang's strong-password authentication protocol

Author keywords

Denial of service attack; Password authentication; Replay attack; Stolen verifier attack; Strong password

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER PROGRAMMING; CRYPTOGRAPHY; MATHEMATICAL MODELS; OPTIMIZATION; PUBLIC POLICY; SECURITY OF DATA;

EID: 21244469256     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/958965.958968     Document Type: Conference Paper
Times cited : (23)

References (17)
  • 1
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password-file compromise
    • S. Bellovin and M. Merritt, "Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password-file compromise," in ACM Conference on Computer and Communications security, pp. 244-250, 1993.
    • (1993) ACM Conference on Computer and Communications Security , pp. 244-250
    • Bellovin, S.1    Merritt, M.2
  • 2
    • 0037285263 scopus 로고    scopus 로고
    • Stolen-verifier attack on two new strong-password authentication protocols
    • Nov.
    • C. M. Chen and W. C. Ku, "Stolen-verifier attack on two new strong-password authentication protocols," IEICE Transactions on Communications, vol. E58-B, no. 11, pp. 2519-2521, Nov. 2002.
    • (2002) IEICE Transactions on Communications , vol.E58-B , Issue.11 , pp. 2519-2521
    • Chen, C.M.1    Ku, W.C.2
  • 3
    • 23344435183 scopus 로고    scopus 로고
    • IEEE P1363.2 / D10 (Standard specifications for public key cryptographic: password-based techniques), July
    • IEEE P1363.2 / D10 (Standard specifications for public key cryptographic: password-based techniques), IEEE P1363 working group, July 2003.
    • (2003) IEEE P1363 Working Group
  • 6
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • D. Jablon, "Strong password-only authenticated key exchange," A CM Computer Communications Review, vol. 20, no. 5 pp. 5-26, 1996.
    • (1996) A CM Computer Communications Review , vol.20 , Issue.5 , pp. 5-26
    • Jablon, D.1
  • 8
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Nov.
    • L. Lamport, "Password authentication with insecure communication," Communications of the A CM, vol. 24, no. 11, pp. 770-772, Nov. 1981.
    • (1981) Communications of the A CM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 9
    • 0035445093 scopus 로고    scopus 로고
    • Attacks and solutions on strong-password authentication
    • Sept.
    • C. L. Lin, H. M. Sun, and T. Hwang, "Attacks and solutions on strong-password authentication," IEICE Transactions on Communications, vol. E84-B, no. 9, pp. 2622-2627, Sept. 2001.
    • (2001) IEICE Transactions on Communications , vol.E84-B , Issue.9 , pp. 2622-2627
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 10
    • 23444434098 scopus 로고    scopus 로고
    • Security enhancement for optimal strong password authen tication protocol
    • April
    • C. W. Lin, J. J. Shen, M. S. Hwang, "Security enhancement for optimal strong password authen tication protocol," ACM Operating System Review, vol. 37, no. 2, pp. 7-12, April 2003.
    • (2003) ACM Operating System Review , vol.37 , Issue.2 , pp. 7-12
    • Lin, C.W.1    Shen, J.J.2    Hwang, M.S.3
  • 12
    • 0013456359 scopus 로고    scopus 로고
    • Comments on the S/KEY user authentication scheme
    • Oct.
    • C. J. Mitchell and L. Chen, "Comments on the S/KEY user authentication scheme," ACM Operating Systems Review, vol. 30, no. 4, pp. 12-16, Oct. 1996.
    • (1996) ACM Operating Systems Review , vol.30 , Issue.4 , pp. 12-16
    • Mitchell, C.J.1    Chen, L.2
  • 13
    • 0003629991 scopus 로고
    • Secure hash standard
    • April
    • National Institute of Standards and Technology, "Secure hash standard," FIPS Publication 180-1, April 1995.
    • (1995) FIPS Publication , vol.180 , Issue.1
  • 14
    • 0034204951 scopus 로고    scopus 로고
    • Simple and secure password authentication protocol (SAS)
    • June
    • M. Sandirigama, A. Shimizu and M. T. Noda, "Simple and secure password authentication protocol (SAS)," IEICE Transactions on Communications, vol. E83-B, no. 6, pp. 1363-1365, June 2000.
    • (2000) IEICE Transactions on Communications , vol.E83-B , Issue.6 , pp. 1363-1365
    • Sandirigama, M.1    Shimizu, A.2    Noda, M.T.3
  • 15
    • 0001459651 scopus 로고
    • A dynamic password authentication method by one-way function
    • July
    • A. Shimizu, "A dynamic password authentication method by one-way function," IEICE Transactions, vol. J73-D-I, no. 7, pp. 630-636, July 1990.
    • (1990) IEICE Transactions , vol.J73-D-I , Issue.7 , pp. 630-636
    • Shimizu, A.1
  • 16
    • 0032137355 scopus 로고    scopus 로고
    • A password authentication methods for contents communication on the internet
    • Aug.
    • A. Shimizu, T. Horioka and H. Inagaki, "A password authentication methods for contents communication on the internet," IEICE Transactions on Communications, vol. E81-B, no. 8, pp. 1666-1673, Aug. 1998.
    • (1998) IEICE Transactions on Communications , vol.E81-B , Issue.8 , pp. 1666-1673
    • Shimizu, A.1    Horioka, T.2    Inagaki, H.3
  • 17
    • 0141938442 scopus 로고    scopus 로고
    • An impersonation attack on one-time password authentication protocol OSPA
    • July
    • T. Tsuji and A. Shimizu, "An impersonation attack on one-time password authentication protocol OSPA," IEICE Transactions on Communications, vol. E86-B, no. 7, pp. 2182-2185, July 2003.
    • (2003) IEICE Transactions on Communications , vol.E86-B , Issue.7 , pp. 2182-2185
    • Tsuji, T.1    Shimizu, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.