Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Volume 17 / Issue 11

available in:   PDF (194 kB) PS (66 kB)
 
get:  
Similar Docs BibTeX   Write a comment
  
get:  
Links into Future
 
DOI:   10.3217/jucs-017-11-1623

 

Security Analysis of Three Password Authentication Schemes

Kyung-Ah Shim (National Institute for Mathematical Sciences, Korea)

Abstract: In this paper, we show that a verifier-based password authentication scheme and two remote user authentication schemes are insecure against several active attacks. These results demonstrate that no more password authentication schemes should be constructed with such ad-hoc methods, i.e, the formal design methodology using provable security should be employed.

Keywords: password-based authentication, remote user authentication, server-compromise attack, smart card, verifier-based password authentication

Categories: D.4.6, E.3