메뉴 건너뛰기




Volumn 39, Issue 1, 2005, Pages 85-89

Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme

Author keywords

Denial of service attack; Guessing attack; Hash function; Password authentication; Stolen verifier attack

Indexed keywords

COMPUTATIONAL COMPLEXITY; COMPUTER CRIME; DATA PRIVACY; FUNCTIONS; SECURITY OF DATA;

EID: 33646469746     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1044552.1044561     Document Type: Article
Times cited : (19)

References (10)
  • 1
    • 0037285263 scopus 로고    scopus 로고
    • Stolen-verifier attack on two new strong-password authentication protocols
    • Nov.
    • C. M. Chen and W. C. Ku, "Stolen-verifier attack on two new strong-password authentication protocols," IEICE Transactions on Communications, vol. E58-B, no. 11, pp. 2519-2521, Nov. 2002.
    • (2002) IEICE Transactions on Communications , vol.E58-B , Issue.11 , pp. 2519-2521
    • Chen, C.M.1    Ku, W.C.2
  • 2
    • 0036556279 scopus 로고    scopus 로고
    • Improvement on Peyravian-Zunic's password authentication schemes
    • April
    • J. J. Hwang and T. C. Yeh, "Improvement on Peyravian-Zunic's password authentication schemes," IEICE Transactions on Communications, vol. E85-B, no. 4, pp. 823-825, April 2002.
    • (2002) IEICE Transactions on Communications , vol.E85-B , Issue.4 , pp. 823-825
    • Hwang, J.J.1    Yeh, T.C.2
  • 3
    • 0142007776 scopus 로고    scopus 로고
    • Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme
    • May
    • W. C. Ku, C. M. Chen, and H. L. Lee, "Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme," IEICE Transactions on Communications, vol. E86-B, no. 5, pp. 1682-1684, May 2003.
    • (2003) IEICE Transactions on Communications , vol.E86-B , Issue.5 , pp. 1682-1684
    • Ku, W.C.1    Chen, C.M.2    Lee, H.L.3
  • 4
    • 7644232640 scopus 로고    scopus 로고
    • Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme
    • Oct.
    • W. C. Ku, C. M. Chen, and H. L. Lee, "Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme," ACM Operating Systems Review, vol. 37, no. 4, pp. 19-25, Oct. 2003.
    • (2003) ACM Operating Systems Review , vol.37 , Issue.4 , pp. 19-25
    • Ku, W.C.1    Chen, C.M.2    Lee, H.L.3
  • 5
    • 0041698517 scopus 로고    scopus 로고
    • A remote user authentication scheme using hash functions,"
    • Oct.
    • C. C. Lee, L. H. Li, and M. S, Hwang, "A remote user authentication scheme using hash functions," ACM Operating Systems Review, vol. 36, no. 4, pp. 23-29, Oct. 2002.
    • (2002) ACM Operating Systems Review , vol.36 , Issue.4 , pp. 23-29
    • Lee, C.C.1    Li, L.H.2    Hwang, M.S.3
  • 6
    • 0035445093 scopus 로고    scopus 로고
    • Attacks and solutions on strong-password authentication
    • Sept.
    • C. L. Lin, H. M. Sun, and T. Hwang, "Attacks and solutions on strong-password authentication," IEICE Transactions on Communications, vol. E84-B, no. 9, pp. 2622-2627, Sept. 2001.
    • (2001) IEICE Transactions on Communications , vol.E84-B , Issue.9 , pp. 2622-2627
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 7
    • 73249134721 scopus 로고
    • Secure hash standard
    • National Institute of Standards and Technology, April
    • National Institute of Standards and Technology, "Secure hash standard," FIPS Publication 180-1, April 1995.
    • (1995) FIPS Publication , vol.180 , Issue.1
  • 8
    • 0033704170 scopus 로고    scopus 로고
    • Methods for protecting password transmission
    • July
    • M. Peyravian and N. Zunic, "Methods for protecting password transmission," Computers & Security, vol. 19, no. 5, pp. 466-469, July 2000.
    • (2000) Computers & Security , vol.19 , Issue.5 , pp. 466-469
    • Peyravian, M.1    Zunic, N.2
  • 9
    • 0003195066 scopus 로고
    • The MD5 message-digest algorithm
    • April
    • R. Rivest, "The MD5 message-digest algorithm," RFC 1321, April 1992.
    • (1992) RFC , vol.1321
    • Rivest, R.1
  • 10
    • 33645790506 scopus 로고    scopus 로고
    • A secure user authentication scheme using hash functions
    • April
    • E. J. Yoon, E. K. Ryu, and K. Y. Yoo, "A secure user authentication scheme using hash functions," ACM Operating Systems Review, vol. 38, no. 2, pp. 62-68, April 2004.
    • (2004) ACM Operating Systems Review , vol.38 , Issue.2 , pp. 62-68
    • Yoon, E.J.1    Ryu, E.K.2    Yoo, K.Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.