The Password Change Phase Is Still Unsecure
نویسنده
چکیده
Yoon et al. proposed a new efficient remote user authentication scheme using smart cards in 2004. This paper analyzes the proposed scheme and then proves that the password change phase of Yoon et al’s scheme is still insecure.
منابع مشابه
The Password Change Phase is Still Insecure
In 2004, W. C. Ku and S. M. Chen proposed an efficient remote user authentication scheme using smart cards to solve the security problems of Chien et al.’s scheme. Recently, Hsu and Yoon et al. pointed out the security weaknesses of the Ku and Chen’s scheme Furthermore, Yoon et al. also proposed a new efficient remote user authentication scheme using smart cards. Yoon et al. also modified the p...
متن کاملPassword Authentication Using Smart Card over Unsecure Channel
Password authentication is one of easiest and most appropriate authentication methods under unprotected channels. The problem of password authentication over unprotected channel is existed in various uses. Computing resources have increased considerably, password authentication is more often needed essential to login to computers, and wireless networks. Many authentication systems that rely on ...
متن کاملSecurity Analysis of a Remote User Authentication Scheme with Smart Cards
Yoon et al. proposed a new efficient remote user authentication scheme using smart cards to solve the security problems of W. C. Ku and S. M. Chen’s scheme. This paper reviews Yoon et al.’s scheme and then proves that the password change phase of Yoon et al’s scheme is still insecure. This paper also proves that the Yoon et al. is still vulnerable to parallel session attack.
متن کاملA Model to Overcome Integrity Challenges of an Untrusted DSMS Server
Despite the fact that using the services of outsourced data stream servers has been welcomed extremely, still the problem of obtaining assurance about the received results from these untrusted servers in unsecure environment is one of the basic challenges. In this paper, we present a probabilistic model for auditing received results from an outsourced data stream server through unsecure communi...
متن کامللبخوانی: روش جدید احراز هویت در برنامههای کاربردی گوشیهای تلفن همراه اندروید
Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017