A Simple Attack on a Recently Introduced Hash-Based Secure User Authentication Scheme
dc.authorid | Koc, Cetin Kaya/0000-0002-2572-9565 | |
dc.contributor.author | Kim, Minho | |
dc.contributor.author | Koc, Cetin Kaya | |
dc.date.accessioned | 2024-10-12T19:43:06Z | |
dc.date.available | 2024-10-12T19:43:06Z | |
dc.date.issued | 2006 | |
dc.department | İstanbul Ticaret Üniversitesi | en_US |
dc.description.abstract | User authentication is an important service in network security. Recently, several user authentication protocols have been proposed. However, a scheme which withstands all known attacks is not yet available. The Lee-Li-Hwang (LLH) authentication scheme [3] was proposed to circumvent the guessing attack in the Peyravian-Zunic (PZ) password scheme [6]. However, Yoon, Ryu, and Yoo (YRY) [9] discovered that the LLH scheme still suffers from the denial of service attack, and proposed an enhancement for the LLH scheme to solve its security problems. More recently, Ku, Chiang, and Chang (KCC) [2] demonstrated that the YRY scheme is vulnerable to the offline guessing and the stolen-verifier attacks. In this paper, we show that the YRY scheme is also vulnerable to the denial-ofservice attack. Furthermore, it was also claimed in [2] that the YRY scheme cannot achieve backward secrecy. We show in this paper that this claim is not entirely valid. | en_US |
dc.identifier.endpage | 160 | en_US |
dc.identifier.issn | 1738-7906 | |
dc.identifier.issue | 5B | en_US |
dc.identifier.startpage | 157 | en_US |
dc.identifier.uri | https://hdl.handle.net/11467/8760 | |
dc.identifier.volume | 6 | en_US |
dc.identifier.wos | WOS:000216993200019 | en_US |
dc.identifier.wosquality | N/A | en_US |
dc.indekslendigikaynak | Web of Science | en_US |
dc.language.iso | en | en_US |
dc.publisher | Int Journal Computer Science & Network Security-Ijcsns | en_US |
dc.relation.ispartof | International Journal Of Computer Science And Network Security | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.snmz | WoS_2024 | en_US |
dc.subject | Hash function | en_US |
dc.subject | user authentication | en_US |
dc.subject | stolen-verifier attack | en_US |
dc.subject | denial-of-service attack | en_US |
dc.title | A Simple Attack on a Recently Introduced Hash-Based Secure User Authentication Scheme | en_US |
dc.type | Article | en_US |