The Password Change Phase Is Still Unsecure

نویسنده

  • Manoj Kumar
چکیده

Yoon et al. proposed a new efficient remote user authentication scheme using smart cards in 2004. This paper analyzes the proposed scheme and then proves that the password change phase of Yoon et al’s scheme is still insecure.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Password Change Phase is Still Insecure

In 2004, W. C. Ku and S. M. Chen proposed an efficient remote user authentication scheme using smart cards to solve the security problems of Chien et al.’s scheme. Recently, Hsu and Yoon et al. pointed out the security weaknesses of the Ku and Chen’s scheme Furthermore, Yoon et al. also proposed a new efficient remote user authentication scheme using smart cards. Yoon et al. also modified the p...

متن کامل

Password Authentication Using Smart Card over Unsecure Channel

Password authentication is one of easiest and most appropriate authentication methods under unprotected channels. The problem of password authentication over unprotected channel is existed in various uses. Computing resources have increased considerably, password authentication is more often needed essential to login to computers, and wireless networks. Many authentication systems that rely on ...

متن کامل

Security Analysis of a Remote User Authentication Scheme with Smart Cards

Yoon et al. proposed a new efficient remote user authentication scheme using smart cards to solve the security problems of W. C. Ku and S. M. Chen’s scheme. This paper reviews Yoon et al.’s scheme and then proves that the password change phase of Yoon et al’s scheme is still insecure. This paper also proves that the Yoon et al. is still vulnerable to parallel session attack.

متن کامل

A Model to Overcome Integrity Challenges of an Untrusted DSMS Server

Despite the fact that using the services of outsourced data stream servers has been welcomed extremely, still the problem of obtaining assurance about the received results from these untrusted servers in unsecure environment is one of the basic challenges. In this paper, we present a probabilistic model for auditing received results from an outsourced data stream server through unsecure communi...

متن کامل

لب‌خوانی: روش جدید احراز هویت در برنامه‌های کاربردی گوشی‌های تلفن همراه اندروید

Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017