메뉴 건너뛰기




Volumn 72, Issue 4, 2006, Pages 727-740

A password authentication scheme over insecure networks

Author keywords

Cryptography; Diffie Hellman key agreement; Network security; One time password; Password authentication

Indexed keywords

CRYPTOGRAPHY; DATABASE SYSTEMS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; PROBLEM SOLVING; SECURITY SYSTEMS; TELECOMMUNICATION SYSTEMS; USER INTERFACES;

EID: 33748126252     PISSN: 00220000     EISSN: 10902724     Source Type: Journal    
DOI: 10.1016/j.jcss.2005.10.001     Document Type: Article
Times cited : (240)

References (41)
  • 1
    • 0034317895 scopus 로고    scopus 로고
    • Cryptanalysis of a remote user authentication scheme using smart cards
    • Chan C.-K., and Cheng L.M. Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Trans. Consumer Electron. 46 (2000) 992-993
    • (2000) IEEE Trans. Consumer Electron. , vol.46 , pp. 992-993
    • Chan, C.-K.1    Cheng, L.M.2
  • 2
    • 0026153410 scopus 로고
    • Remote password authentication with smart cards
    • Chang C.C., and Wu T.C. Remote password authentication with smart cards. IEE Proceedings-E 138 (1991) 165-168
    • (1991) IEE Proceedings-E , vol.138 , pp. 165-168
    • Chang, C.C.1    Wu, T.C.2
  • 3
    • 0037285263 scopus 로고    scopus 로고
    • Stolen-verifier attack on two new strong-password authentication protocols
    • Chen C.-M., and Ku W.-C. Stolen-verifier attack on two new strong-password authentication protocols. IEICE Trans. Commun. E85-B (2002) 2519-2521
    • (2002) IEICE Trans. Commun. E85-B , pp. 2519-2521
    • Chen, C.-M.1    Ku, W.-C.2
  • 4
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • Chien H.-Y., Jan J.-K., and Tseng Y.-M. An efficient and practical solution to remote authentication: Smart card. Computers & Security 21 (2002) 372-375
    • (2002) Computers & Security , vol.21 , pp. 372-375
    • Chien, H.-Y.1    Jan, J.-K.2    Tseng, Y.-M.3
  • 5
    • 33748173666 scopus 로고    scopus 로고
    • Revisit of McCullagh-Barreto two-party id-based authenticated key agreement protocols
    • Choo K.-K.R. Revisit of McCullagh-Barreto two-party id-based authenticated key agreement protocols. Internat. J. Network Security 1 3 (2005) 154-160
    • (2005) Internat. J. Network Security , vol.1 , Issue.3 , pp. 154-160
    • Choo, K.-K.R.1
  • 7
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal T. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory 31 (1985) 469-472
    • (1985) IEEE Trans. Inform. Theory , vol.31 , pp. 469-472
    • ElGamal, T.1
  • 8
    • 0016092372 scopus 로고
    • A user authentication scheme not requiring secrecy in the computer
    • Evans Jr. A., Kantrowitz W., and Weiss E. A user authentication scheme not requiring secrecy in the computer. Commun. ACM 17 (1974) 437-442
    • (1974) Commun. ACM , vol.17 , pp. 437-442
    • Evans Jr., A.1    Kantrowitz, W.2    Weiss, E.3
  • 10
    • 33748137641 scopus 로고    scopus 로고
    • N. Haller, The S/KEY one-time password system, RFC Technical Report 1760, February 1995
  • 11
    • 0032669728 scopus 로고    scopus 로고
    • Cryptanalysis of remote login authentication scheme
    • Hwang M.-S. Cryptanalysis of remote login authentication scheme. Comput. Commun. 22 8 (1999) 742-744
    • (1999) Comput. Commun. , vol.22 , Issue.8 , pp. 742-744
    • Hwang, M.-S.1
  • 12
    • 0000362936 scopus 로고    scopus 로고
    • An improvement of SPLICE/AS in WIDE against guessing attack
    • Hwang M.-S., Lee C.-C., and Tang Y.-L. An improvement of SPLICE/AS in WIDE against guessing attack. Internat. J. Inform. 12 2 (2001) 297-302
    • (2001) Internat. J. Inform. , vol.12 , Issue.2 , pp. 297-302
    • Hwang, M.-S.1    Lee, C.-C.2    Tang, Y.-L.3
  • 14
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • Hwang M.-S., and Li L.-H. A new remote user authentication scheme using smart cards. IEEE Trans. Consumer Electron. 46 1 (2000) 28-30
    • (2000) IEEE Trans. Consumer Electron. , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.-S.1    Li, L.-H.2
  • 15
    • 0002063278 scopus 로고    scopus 로고
    • 'Paramita wisdom' password authentication scheme without verification tables
    • Jan J.K., and Chen Y.Y. 'Paramita wisdom' password authentication scheme without verification tables. J. Syst. Softw. 42 (1998) 45-57
    • (1998) J. Syst. Softw. , vol.42 , pp. 45-57
    • Jan, J.K.1    Chen, Y.Y.2
  • 16
    • 0025384135 scopus 로고
    • Identity authentication based on keystroke latencies
    • Joyce R., and Gupta G. Identity authentication based on keystroke latencies. Commun. ACM 33 (1990) 168-176
    • (1990) Commun. ACM , vol.33 , pp. 168-176
    • Joyce, R.1    Gupta, G.2
  • 17
    • 0029214744 scopus 로고
    • Biometrics, is it a viable proposition for identity authentication and access control
    • Kim H.J. Biometrics, is it a viable proposition for identity authentication and access control. Comput. Secur. 14 (1995) 205-214
    • (1995) Comput. Secur. , vol.14 , pp. 205-214
    • Kim, H.J.1
  • 18
    • 33646236878 scopus 로고    scopus 로고
    • A simple attack on a recently introduced hash-based strong-password authentication scheme
    • Kim M., and Koc C.K. A simple attack on a recently introduced hash-based strong-password authentication scheme. Internat. J. Network Security 1 2 (2005) 77-80
    • (2005) Internat. J. Network Security , vol.1 , Issue.2 , pp. 77-80
    • Kim, M.1    Koc, C.K.2
  • 19
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport L. Password authentication with insecure communication. Commun. ACM 24 (1981) 770-772
    • (1981) Commun. ACM , vol.24 , pp. 770-772
    • Lamport, L.1
  • 20
    • 33645287503 scopus 로고    scopus 로고
    • Two attacks on the Wu-Hsu user identification scheme
    • Lee C.C. Two attacks on the Wu-Hsu user identification scheme. Internat. J. Network Security 1 3 (2005) 147-148
    • (2005) Internat. J. Network Security , vol.1 , Issue.3 , pp. 147-148
    • Lee, C.C.1
  • 21
    • 0035445093 scopus 로고    scopus 로고
    • Attacks and solutions on strong-password authentication
    • Lin C.L., Sun H.M., and Hwang T. Attacks and solutions on strong-password authentication. IEICE Trans. Commun. E84-B (2001) 2622-2627
    • (2001) IEICE Trans. Commun. E84-B , pp. 2622-2627
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 22
    • 0013456359 scopus 로고    scopus 로고
    • Comments on the S/KEY user authentication scheme
    • Mitchell C.J., and Chen L. Comments on the S/KEY user authentication scheme. ACM Operating Syst. Rev. 30 (1996) 12-16
    • (1996) ACM Operating Syst. Rev. , vol.30 , pp. 12-16
    • Mitchell, C.J.1    Chen, L.2
  • 23
    • 33748164338 scopus 로고    scopus 로고
    • National Bureau of Standards, Data Encryption Standards, NBS: FIPS, 1977
  • 24
    • 33748148555 scopus 로고    scopus 로고
    • NIST, Secure hash standard, Technical report FIPS 180-1, NIST, US Department of Commerce, April 1995
  • 25
    • 33748207261 scopus 로고    scopus 로고
    • NIST, Advanced encryption standard, Technical report FIPS 197, NIST, US Department of Commerce, November 2001
  • 26
    • 0016090968 scopus 로고
    • A high security log-in procedure
    • Purdy G.B. A high security log-in procedure. Commun. ACM 17 (1974) 442-445
    • (1974) Commun. ACM , vol.17 , pp. 442-445
    • Purdy, G.B.1
  • 27
    • 33748194565 scopus 로고    scopus 로고
    • R. Rivest, The MD5 message digest algorithm, Technical report RFC 1321, IETF, April 1992
  • 28
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Rivest R.L., Shamir A., and Adleman L. A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21 (1978) 120-126
    • (1978) Commun. ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 30
    • 0042196051 scopus 로고    scopus 로고
    • A modified remote user authentication scheme using smart cards
    • Shen J.-J., Lin C.-W., and Hwang M.-S. A modified remote user authentication scheme using smart cards. IEEE Trans. Consumer Electron. 49 2 (2003) 414-416
    • (2003) IEEE Trans. Consumer Electron. , vol.49 , Issue.2 , pp. 414-416
    • Shen, J.-J.1    Lin, C.-W.2    Hwang, M.-S.3
  • 31
    • 0242552286 scopus 로고    scopus 로고
    • Security enhancement for the timestamp-based password authentication scheme using smart cards
    • Shen J.-J., Lin C.-W., and Hwang M.-S. Security enhancement for the timestamp-based password authentication scheme using smart cards. Comput. Secur. 22 7 (2003) 591-595
    • (2003) Comput. Secur. , vol.22 , Issue.7 , pp. 591-595
    • Shen, J.-J.1    Lin, C.-W.2    Hwang, M.-S.3
  • 32
    • 0001459651 scopus 로고
    • A dynamic password authentication method by one-way function
    • Shimizu A. A dynamic password authentication method by one-way function. IEICE Trans. Inform. Syst. J73-D-I (1990) 630-636
    • (1990) IEICE Trans. Inform. Syst. J73-D-I , pp. 630-636
    • Shimizu, A.1
  • 33
    • 0032137355 scopus 로고    scopus 로고
    • A password authentication method for contents communication on the Internet
    • Shimizu A., Horioka T., and Inagaki H. A password authentication method for contents communication on the Internet. IEICE Trans. Commun. E81-B (1998) 1666-1763
    • (1998) IEICE Trans. Commun. E81-B , pp. 1666-1763
    • Shimizu, A.1    Horioka, T.2    Inagaki, H.3
  • 34
    • 0034318245 scopus 로고    scopus 로고
    • An efficient remote use authentication scheme using smart cards
    • Sun H.-M. An efficient remote use authentication scheme using smart cards. IEEE Trans. Consumer Electron. 46 4 (2000) 958-961
    • (2000) IEEE Trans. Consumer Electron. , vol.46 , Issue.4 , pp. 958-961
    • Sun, H.-M.1
  • 35
    • 0242552288 scopus 로고    scopus 로고
    • Cryptanalysis of an enhanced timestamp-based password authentication scheme
    • Wang B., Li J.H., and Tong Z.P. Cryptanalysis of an enhanced timestamp-based password authentication scheme. Comput. Secur. 22 7 (2003) 643-645
    • (2003) Comput. Secur. , vol.22 , Issue.7 , pp. 643-645
    • Wang, B.1    Li, J.H.2    Tong, Z.P.3
  • 36
    • 33645291303 scopus 로고    scopus 로고
    • Cryptanalysis of a secure one-time password authentication scheme with low-communication for mobile communications
    • Wu H.-C., Liu C.-Y., and Chiou S.-F. Cryptanalysis of a secure one-time password authentication scheme with low-communication for mobile communications. Internat. J. Network Security 1 2 (2005) 74-76
    • (2005) Internat. J. Network Security , vol.1 , Issue.2 , pp. 74-76
    • Wu, H.-C.1    Liu, C.-Y.2    Chiou, S.-F.3
  • 37
    • 0029535942 scopus 로고
    • Remote login authentication scheme based on a geometric approach
    • Wu T.C. Remote login authentication scheme based on a geometric approach. Comput. Commun. 18 12 (1995) 959-963
    • (1995) Comput. Commun. , vol.18 , Issue.12 , pp. 959-963
    • Wu, T.C.1
  • 39
    • 0033350090 scopus 로고    scopus 로고
    • Password authentication schemes with smart cards
    • Yang W.H., and Shieh S.P. Password authentication schemes with smart cards. Comput. Secur. 18 8 (1999) 727-733
    • (1999) Comput. Secur. , vol.18 , Issue.8 , pp. 727-733
    • Yang, W.H.1    Shieh, S.P.2
  • 40
    • 33748196456 scopus 로고    scopus 로고
    • Man-in-the-middle attack on the authentication of the user from the remote autonomous object
    • Yang C.-Y., Lee C.-C., and Hsiao S.-Y. Man-in-the-middle attack on the authentication of the user from the remote autonomous object. Internat. J. Network Security 1 2 (2005) 81-83
    • (2005) Internat. J. Network Security , vol.1 , Issue.2 , pp. 81-83
    • Yang, C.-Y.1    Lee, C.-C.2    Hsiao, S.-Y.3
  • 41
    • 0037285305 scopus 로고    scopus 로고
    • A secure one-time password authentication scheme using smart cards
    • Yeh T.-C., Shen H.-Y., and Hwang J.-J. A secure one-time password authentication scheme using smart cards. IEICE Trans. Commun. E85-B (2002) 2515-2518
    • (2002) IEICE Trans. Commun. E85-B , pp. 2515-2518
    • Yeh, T.-C.1    Shen, H.-Y.2    Hwang, J.-J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.