JOURNAL ARTICLE

Cryptanalysis of Remote User Authentication Scheme

Jongseok ChoiSeung-Soo ShinKun-Hee Han

Year: 2009 Journal:   Journal of the Korea Academia-Industrial cooperation Society Vol: 10 (2)Pages: 327-333   Publisher: The Korea Academia-Industrial Cooperation Society

Abstract

2004년에 Das 등은 사용자의 익명성을 보장하기 위한 원격 사용자 인증 구조를 제안했다. 2005년에 Chien 등이 Das 구조는 사용자의 익명성을 보장하지 못한다는 문제점을 제기하고 새로운 구조를 제안하였다. 2007년에 Hu 등은 Chien과 Chen 구조도 강한 서버/사용자 가장 공격, 제한된 재전송 공격, 서비스거부 공격 등과 같은 공격에 취약하며, 잘못된 패스워드의 탐지가 늦다는 문제점을 제기하고 새로운 구조를 제안했다. 2008년에는 Bindu 등이 Chien 과 Chen 구조에 대해서 강한 서버/사용자 가장 공격에 대한 문제점을 제기하고 그 문제점을 해결하기 위한 새로운 구조를 제안하였다. 그러나 우리는 Hu et al. 구조와 Bindu et al. 구조 모두 사용자 익명성과 서비스 거부 공격에 대하여 취약하다는 것을 보였다. In 2004, Das et al. proposed a scheme for preserving a user anonymity. However, In 2005, Chien and Chen pointed out that Das et al. scheme fail to protect the user anonymity, and proposed a new scheme. And then in 2007, Hu et al. pointed out that Chien and Chen scheme also has some problems; it is Strong masquerading server/user attack, Restricted replay attack, Denial of service attack. it also slow wrong password detection, and proposed a new scheme. In 2008, Bindu et al. repeatedly pointed out on Chien and Chen scheme and proposed their scheme. However, we point out that all of their scheme also has some problems; it is not to protect the user anonymity and Denial of service attack. In addition, Bindu et al. is vulnerable to Strong masquerading server/user attack. Therefore, we demonstrate that their scheme also have some problems; it is the user anonymity and denial of service attack as above.

Keywords:
Anonymity Computer science Scheme (mathematics) Computer security Denial-of-service attack Cryptanalysis Replay attack Password Cryptography The Internet World Wide Web Mathematics

Metrics

1
Cited By
0.34
FWCI (Field Weighted Citation Impact)
10
Refs
0.68
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications
User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Cryptanalysis of a Remote User Authentication Scheme

Journal:   Journal of Environmental Science Computer Science and Engineering & Technology Year: 2017 Vol: 6 (4)
JOURNAL ARTICLE

Cryptanalysis of a Remote User Authentication Scheme

Bang Ju WangHuan Guo Zhang

Journal:   Applied Mechanics and Materials Year: 2013 Vol: 433-435 Pages: 1699-1701
JOURNAL ARTICLE

Cryptanalysis of a Secure Remote User Authentication Scheme

Qiuyan JinKwangwoo LeeDongho Won

Journal:   The Journal of Korean Institute of Communications and Information Sciences Year: 2012 Vol: 37 (8C)Pages: 697-702
JOURNAL ARTICLE

Cryptanalysis of Biometric-based to Remote User Authentication Scheme

Kwang-Cheul Shin

Journal:   The Journal of Korean Institute of Information Technology Year: 2019 Vol: 17 (2)Pages: 133-141
© 2026 ScienceGate Book Chapters — All rights reserved.