메뉴 건너뛰기




Volumn 1, Issue , 2010, Pages 477-480

Security weaknesses of song's advanced smart card based password authentication protocol

Author keywords

Network security; Password based authentication; Smart card

Indexed keywords

AUTHENTICATION SCHEME; EFFICIENT AUTHENTICATION; INSECURE NETWORKS; INSIDER ATTACK; MODULAR EXPONENTIATIONS; OFFLINE PASSWORD GUESSING ATTACK; PASSWORD AUTHENTICATION; PASSWORD BASED AUTHENTICATION; PERFECT FORWARD SECRECY; SECURITY WEAKNESS; SYMMETRIC KEYS; TAMPER-RESISTANT; USER ANONYMITY; USER AUTHENTICATION;

EID: 79951505114     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PIC.2010.5687579     Document Type: Conference Paper
Times cited : (9)

References (20)
  • 1
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, "Password authentication with insecure communication," Commun. ACM, vol. 24, no. 11, pp. 770-772, 1981.
    • (1981) Commun. ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 3
    • 0036302680 scopus 로고    scopus 로고
    • An efficient and practical solution to remote authentication: Smart card
    • H. Y. Chien, J. K. Jan, and Y. M. Tseng, "An efficient and practical solution to remote authentication: smart card," Comput. Secur., vol. 21, no. 4, pp. 372-375, 2002.
    • (2002) Comput. Secur. , vol.21 , Issue.4 , pp. 372-375
    • Chien, H.Y.1    Jan, J.K.2    Tseng, Y.M.3
  • 4
    • 0037008805 scopus 로고    scopus 로고
    • A simple remote user authentication scheme
    • M. S. Hwang, C. C. Lee, and Y. L. Tang, "A simple remote user authentication scheme," Math. Comput. Model., vol. 36, no. 1-2, pp. 103-107, 2002.
    • (2002) Math. Comput. Model. , vol.36 , Issue.1-2 , pp. 103-107
    • Hwang, M.S.1    Lee, C.C.2    Tang, Y.L.3
  • 5
    • 1942423677 scopus 로고    scopus 로고
    • Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
    • W. C. Ku and S. M. Chen, "Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards," IEEE Trans. Consum. Electron., vol. 50, no. 1, pp. 204-207, 2004.
    • (2004) IEEE Trans. Consum. Electron. , vol.50 , Issue.1 , pp. 204-207
    • Ku, W.C.1    Chen, S.M.2
  • 6
    • 1542335451 scopus 로고    scopus 로고
    • Efficient password authenticated key agreement using smart cards
    • W. S. Juang, "Efficient password authenticated key agreement using smart cards," Comput. Secur., vol. 23, no. 2, 167-173, 2004.
    • (2004) Comput. Secur. , vol.23 , Issue.2 , pp. 167-173
    • Juang, W.S.1
  • 7
    • 9544232528 scopus 로고    scopus 로고
    • Improved remote authentication scheme with smart card
    • N. Y. Lee and Y. C. Chiu, "Improved remote authentication scheme with smart card," Comput. Stand. Interfaces, vol. 27, no. 2, pp. 177-180, 2005.
    • (2005) Comput. Stand. Interfaces , vol.27 , Issue.2 , pp. 177-180
    • Lee, N.Y.1    Chiu, Y.C.2
  • 8
    • 9544227377 scopus 로고    scopus 로고
    • Improvement of Chien et al.'s remote user authentication scheme using smart cards
    • S. W. Lee, H. S. Kim, and K. Y. Yoo, "Improvement of Chien et al.'s remote user authentication scheme using smart cards, " Comput. Stand. Interfaces, vol. 27, no. 2, pp. 181-183, 2005.
    • (2005) Comput. Stand. Interfaces , vol.27 , Issue.2 , pp. 181-183
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 9
    • 33646477537 scopus 로고    scopus 로고
    • An efficient and complete remote user authentication scheme using smart cards
    • H. T. Liaw, J. F. Lin, and W. C. Wu, "An efficient and complete remote user authentication scheme using smart cards," Math. Comput. Model., vol. 44, no. 1-2, pp. 223-228, 2006.
    • (2006) Math. Comput. Model. , vol.44 , Issue.1-2 , pp. 223-228
    • Liaw, H.T.1    Lin, J.F.2    Wu, W.C.3
  • 10
    • 32444434862 scopus 로고    scopus 로고
    • Efficient remote mutual authentication and key agreement
    • W. G. Shieh and J. M. Wang, "Efficient remote mutual authentication and key agreement," Comput. Secur., vol. 25, no. 1, pp. 72-77, 2006.
    • (2006) Comput. Secur. , vol.25 , Issue.1 , pp. 72-77
    • Shieh, W.G.1    Wang, J.M.2
  • 11
    • 28044451335 scopus 로고    scopus 로고
    • Robust remote authentication scheme with smart cards
    • C. I. Fan, Y. C. Chan, and Z. K. Zhang, "Robust remote authentication scheme with smart cards," Comput. Secur., vol. 24, no. 8, pp. 619-628, 2005.
    • (2005) Comput. Secur. , vol.24 , Issue.8 , pp. 619-628
    • Fan, C.I.1    Chan, Y.C.2    Zhang, Z.K.3
  • 12
    • 33748126252 scopus 로고    scopus 로고
    • A password authentication scheme over insecure networks
    • I. E. Liao, C. C. Lee, and M. S. Hwang, "A password authentication scheme over insecure networks, " J. Comput. Syst. Sci., vol. 72, no. 4, pp. 727-740, 2006.
    • (2006) J. Comput. Syst. Sci. , vol.72 , Issue.4 , pp. 727-740
    • Liao, I.E.1    Lee, C.C.2    Hwang, M.S.3
  • 13
    • 34248666700 scopus 로고    scopus 로고
    • Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
    • X. M. Wang, W. F. Zhang, J. S. Zhang, M. K. Khan, "Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards, " Comput. Stand. Interfaces, vol. 29, no. 5, pp. 507-512, 2007.
    • (2007) Comput. Stand. Interfaces , vol.29 , Issue.5 , pp. 507-512
    • Wang, X.M.1    Zhang, W.F.2    Zhang, J.S.3    Khan, M.K.4
  • 14
    • 62549133356 scopus 로고    scopus 로고
    • Robust and efficient password-authenticated key agreement using smart cards
    • W. S. Juang, S. T. Chen, and H. T. Liaw, "Robust and efficient password-authenticated key agreement using smart cards, IEEE Trans. Ind. Electron., vol. 55, no. 6, pp. 2551-2556, 2008.
    • (2008) IEEE Trans. Ind. Electron. , vol.55 , Issue.6 , pp. 2551-2556
    • Juang, W.S.1    Chen, S.T.2    Liaw, H.T.3
  • 15
    • 43049128557 scopus 로고    scopus 로고
    • Efficient password authenticated key agreement using bilinear pairings
    • W. S. Juang and W. K. Nien, "Efficient password authenticated key agreement using bilinear pairings," Math. Comput. Model., vol. 47, no. 11-12, pp. 1238-1245, 2008.
    • (2008) Math. Comput. Model. , vol.47 , Issue.11-12 , pp. 1238-1245
    • Juang, W.S.1    Nien, W.K.2
  • 16
    • 64249169230 scopus 로고    scopus 로고
    • Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments
    • H. R. Chung, W. C. Ku, M. J. Tsaur, "Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments," Comput. Stand. Interfaces, vol. 31, no. 4, pp. 863-868, 2009.
    • (2009) Comput. Stand. Interfaces , vol.31 , Issue.4 , pp. 863-868
    • Chung, H.R.1    Ku, W.C.2    Tsaur, M.J.3
  • 17
    • 64249125305 scopus 로고    scopus 로고
    • An improved smart card based password authentication scheme with provable security
    • J. Xu, W. T. Zhu, D. G. Feng, "An improved smart card based password authentication scheme with provable security," Comput. Stand. Interfaces, vol. 31, no. 4, pp. 723-728, 2009.
    • (2009) Comput. Stand. Interfaces , vol.31 , Issue.4 , pp. 723-728
    • Xu, J.1    Zhu, W.T.2    Feng, D.G.3
  • 18
    • 77955312905 scopus 로고    scopus 로고
    • Advanced smart card based password authentication protocol
    • R. Song, "Advanced smart card based password authentication protocol," Comput. Stand. Interfaces, vol. 32, no. 5-6, pp. 321-325, 2010.
    • (2010) Comput. Stand. Interfaces , vol.32 , Issue.5-6 , pp. 321-325
    • Song, R.1
  • 19
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Proc. Advances in Cryptology
    • P. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," Proc. Advances in Cryptology (LNCS 1666), 1999, pp. 388-397.
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 20
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • T. S. Messerges, E. A. Dabbish, and R. H. Sloan, "Examining smart-card security under the threat of power analysis attacks," IEEE Trans. Comput., vol. 51, no. 5, pp. 541-552, 2002.
    • (2002) IEEE Trans. Comput. , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.