메뉴 건너뛰기




Volumn 7513 LNCS, Issue , 2012, Pages 110-118

Breaking a robust remote user authentication scheme using smart cards

Author keywords

Authentication protocol; Cryptanalysis; Forward secrecy; Offline password guessing attack; Smart card

Indexed keywords

AUTHENTICATION PROTOCOLS; CRYPTANALYSIS; CRYPTOGRAPHIC PROTOCOLS; FORWARD SECRECY; KEY-COMPROMISE IMPERSONATION; OFFLINE PASSWORD GUESSING ATTACK; PASSWORD-BASED AUTHENTICATION; REMOTE USER AUTHENTICATION SCHEMES; SECURITY ANALYSIS; SECURITY FAILURE; SECURITY GOALS; USER ANONYMITY; VARIOUS ATTACKS;

EID: 84871602807     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-35606-3_13     Document Type: Conference Paper
Times cited : (6)

References (20)
  • 2
    • 79956280962 scopus 로고    scopus 로고
    • JXTA-OVERLAY: A P2P platform for distributed, collaborative and ubiquitous computing
    • Barolli, L., Xhafa, F.: JXTA-OVERLAY: A P2P platform for distributed, collaborative and ubiquitous computing. IEEE Transactions on Industrial Electronics 58(6), 2163-2172 (2010)
    • (2010) IEEE Transactions on Industrial Electronics , vol.58 , Issue.6 , pp. 2163-2172
    • Barolli, L.1    Xhafa, F.2
  • 3
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11), 770-772 (1981)
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 5
    • 0026153410 scopus 로고
    • Remote password authentication with smart cards
    • Chang, C.C., Wu, T.C.: Remote password authentication with smart cards. IEE Proceedings-E 138(3), 165-168 (1993)
    • (1993) IEE Proceedings-E , vol.138 , Issue.3 , pp. 165-168
    • Chang, C.C.1    Wu, T.C.2
  • 6
    • 4043152192 scopus 로고    scopus 로고
    • Further improvement of an efficient password based remote user authentication scheme using smart cards
    • Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Further improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 50(2), 612-614 (2004)
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.2 , pp. 612-614
    • Yoon, E.J.1    Ryu, E.K.2    Yoo, K.Y.3
  • 7
    • 52949137008 scopus 로고    scopus 로고
    • Two-factor mutual authentication based on smart cards and password
    • Yang, G., Wong, D.S., Wang, H., Deng, X.: Two-factor mutual authentication based on smart cards and password. Journal of Computer and System Sciences 74(7), 1160-1172 (2008)
    • (2008) Journal of Computer and System Sciences , vol.74 , Issue.7 , pp. 1160-1172
    • Yang, G.1    Wong, D.S.2    Wang, H.3    Deng, X.4
  • 8
    • 59649086399 scopus 로고    scopus 로고
    • Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards
    • Hsiang, H.C., Shih, W.K.: Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards. Computer Communications 32(4), 649-652 (2009)
    • (2009) Computer Communications , vol.32 , Issue.4 , pp. 649-652
    • Hsiang, H.C.1    Shih, W.K.2
  • 9
    • 77952401833 scopus 로고    scopus 로고
    • An improvement of Hsiang-Shih's authentication scheme using smart cards
    • ACM Press, New York
    • Sood, S.K., Sarje, A.K., Singh, K.: An improvement of Hsiang-Shih's authentication scheme using smart cards. In: Proceedings of ICWET 2010, pp. 19-25. ACM Press, New York (2010)
    • (2010) Proceedings of ICWET 2010 , pp. 19-25
    • Sood, S.K.1    Sarje, A.K.2    Singh, K.3
  • 10
    • 84863239521 scopus 로고    scopus 로고
    • Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme
    • Ramanujam, R., Ramaswamy, S. (eds.) ICDCIT 2012. Springer, Heidelberg
    • Ma, C.-G., Wang, D., Zhang, Q.-M.: Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme. In: Ramanujam, R., Ramaswamy, S. (eds.) ICDCIT 2012. LNCS, vol. 7154, pp. 141-152. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7154 , pp. 141-152
    • Ma, C.-G.1    Wang, D.2    Zhang, Q.-M.3
  • 12
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
    • Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 13
    • 0036566408 scopus 로고    scopus 로고
    • Examining Smart-Card Security under the Threat of Power Analysis Attacks
    • Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Transactions on Computers 51(5), 541-552 (2002)
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 14
    • 79959430513 scopus 로고    scopus 로고
    • One for all-all for one: Unifying standard differential power analysis attacks
    • Mangard, S., Oswald, E., Standaert, F.X.: One for all-all for one: unifying standard differential power analysis attacks. IET Information Security 5(2), 100-110 (2011)
    • (2011) IET Information Security , vol.5 , Issue.2 , pp. 100-110
    • Mangard, S.1    Oswald, E.2    Standaert, F.X.3
  • 15
    • 40949152760 scopus 로고    scopus 로고
    • Password authentication schemes: Current status and key issues
    • Tsai, C., Lee, C., Hwang, M.: Password authentication schemes: current status and key issues. International Journal of Network Security 3(2), 101-115 (2006)
    • (2006) International Journal of Network Security , vol.3 , Issue.2 , pp. 101-115
    • Tsai, C.1    Lee, C.2    Hwang, M.3
  • 16
    • 84949230533 scopus 로고    scopus 로고
    • Key Agreement Protocols and Their Security Analysis
    • Darnell, M.J. (ed.) Cryptography and Coding 1997. Springer, Heidelberg
    • Blake-Wilson, S., Johnson, D., Menezes, A.: Key Agreement Protocols and Their Security Analysis. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 30-45. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1355 , pp. 30-45
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 17
    • 33745179557 scopus 로고    scopus 로고
    • HMQV: A High-Performance Secure Diffie-Hellman Protocol
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Krawczyk, H.: HMQV: A High-Performance Secure Diffie-Hellman Protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 546-566
    • Krawczyk, H.1
  • 18
    • 78049322666 scopus 로고    scopus 로고
    • Two robust remote user authentication protocols using smart cards
    • Yeh, K.H., Su, C.H., Lo, N.W.: Two robust remote user authentication protocols using smart cards. Journal of Systems and Software 83(12), 2556-2565 (2010)
    • (2010) Journal of Systems and Software , vol.83 , Issue.12 , pp. 2556-2565
    • Yeh, K.H.1    Su, C.H.2    Lo, N.W.3
  • 19
    • 0040231044 scopus 로고
    • Foiling the Cracker: A Survey of, and Improvements to, Password Security
    • USENIX Association, Portland
    • Klein, D.V.: Foiling the Cracker: A Survey of, and Improvements to, Password Security. In: 2nd USENIX Security Workshop, pp. 5-14. USENIX Association, Portland (1990)
    • (1990) 2nd USENIX Security Workshop , pp. 5-14
    • Klein, D.V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.