JOURNAL ARTICLE

Cryptanalysis of a Secure Remote User Authentication Scheme

Qiuyan JinKwangwoo LeeDongho Won

Year: 2012 Journal:   The Journal of Korean Institute of Communications and Information Sciences Vol: 37 (8C)Pages: 697-702   Publisher: THE KOREAN INSTITUTE OF COMMUNICATIONS AND INFORMATION SCIENCES (KICS)

Abstract

2011년, C.-T. Li et al.은 Kim et al. 스킴의 문제점인 오프라인 패스워드 추측 공격과 신분 위장 공격을 해결한 향상된 안전한 사용자 인증 스킴을 제안하였다. C.-T. Li et al.은 그들이 제안하는 방식이 패스워드 추측 공격과 신분 위장 공격 등의 스마트카드 보안 관련 공격들을 막을 수 있다고 주장하였다. 또한 상호 인증과 세션 키 생성을 제공한다는 장점을 가지고 있었다. 하지만, 본 논문에서 분석한 결과, C.-T. Li et al.의 스킴은 패스워드 변경 단계에서의 패스워드 추측 공격이나 스마트카드 위조 공격, 훔친 검증자 공격(stolen verifier attack)에 취약함이 발견되었다. 본 논문에서는 C.-T. Li et al.의 스킴이 패스워드 추측 공격에 대해 안전하지 않으며, 실용적이지 않다는 것을 지적하고자 한다. In 2011, C.-T. Li et al. proposed a secure user authentication scheme, which is an improvement over Kim et al.'s scheme to resolve several security flaws such as off-line password guessing attack and masquerading attack. C.-T. Li et al. claimed that their scheme prevents smart card security related attacks. Moreover, it provides mutual authentication and session key establishment. However, we found that their scheme is vulnerable to password guessing attack through password change phase, smart card forgery attack and stolen verifier attack. Moreover, C.-T. Li et al.'s scheme is not secure against password guessing attack as they claimed. In this paper, we also point out that their scheme is not practical to use.

Keywords:
Computer security Password Password cracking Cryptanalysis S/KEY Computer science Dictionary attack Challenge–response authentication Smart card Scheme (mathematics) Salt (chemistry) One-time password Password strength Authentication protocol Cryptography Mathematics Chemistry

Metrics

9
Cited By
3.41
FWCI (Field Weighted Citation Impact)
14
Refs
0.92
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications
User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems
Biometric Identification and Security
Physical Sciences →  Computer Science →  Signal Processing

Related Documents

JOURNAL ARTICLE

Cryptanalysis of Remote User Authentication Scheme

Jongseok ChoiSeung-Soo ShinKun-Hee Han

Journal:   Journal of the Korea Academia-Industrial cooperation Society Year: 2009 Vol: 10 (2)Pages: 327-333
JOURNAL ARTICLE

Cryptanalysis of a Remote User Authentication Scheme

Journal:   Journal of Environmental Science Computer Science and Engineering & Technology Year: 2017 Vol: 6 (4)
JOURNAL ARTICLE

Cryptanalysis of a Remote User Authentication Scheme

Bang Ju WangHuan Guo Zhang

Journal:   Applied Mechanics and Materials Year: 2013 Vol: 433-435 Pages: 1699-1701
© 2026 ScienceGate Book Chapters — All rights reserved.