scispace - formally typeset
Journal ArticleDOI

Limitations of challenge-response entity authentication

17 Aug 1989-Electronics Letters (IET)-Vol. 25, Iss: 17, pp 1195-1196

...read more


Citations
More filters
Journal ArticleDOI

[...]

TL;DR: A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protocols.
Abstract: We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protocols. The definition of a secure protocol is considered, and desirable characteristics of secure protocols are discussed.

1,231 citations


Cites background or result from "Limitations of challenge-response e..."

  • [...]

  • [...]

Journal ArticleDOI

[...]

TL;DR: The weaknesses of Chien et al.'s scheme are shown, and an improved scheme with better security strength is proposed, which is vulnerable to a reflection attack and an insider attack.
Abstract: Recently, Chien et al. proposed an efficient remote authentication scheme using smart cards. However, we find that their scheme is vulnerable to a reflection attack and an insider attack. In addition, their scheme lacks reparability. Herein, we first show the weaknesses of Chien et al.'s scheme, and then propose an improved scheme with better security strength.

291 citations


Cites background from "Limitations of challenge-response e..."

  • [...]

  • [...]

  • [...]

  • [...]

Book ChapterDOI

[...]

17 Aug 1998
TL;DR: This paper surveys recent work on the design and analysis of key agreement protocols that are based on the intractability of the Diffie-Hellman problem and the practical and provable security aspects of these protocols are discussed.
Abstract: This paper surveys recent work on the design and analysis of key agreement protocols that are based on the intractability of the Diffie-Hellman problem. The focus is on protocols that have been standardized, or are in the process of being standardized, by organizations such as ANSI, IEEE, ISO/IEC, and NIST. The practical and provable security aspects of these protocols are discussed.

276 citations

ReportDOI

[...]

01 Jan 1994
TL;DR: A taxonomy of replay attacks on cryptographic protocols in terms of message origin and destination is presented, complete in the sense that any replay attack is composed entirely of elements classified by the taxonomy.
Abstract: : This paper presents a taxonomy of replay attacks on cryptographic protocols in terms of message origin and destination. The taxonomy is independent of any method used to analyze or prevent such attacks. It is also complete in the sense that any replay attack is composed entirely of elements classified by the taxonomy. The classification of attacks is illustrated using both new and previously known attacks on protocols. The taxonomy is also used to discuss the appropriateness of particular countermeasures and protocol analysis methods to particular kinds of replays.

254 citations

Journal ArticleDOI

[...]

TL;DR: An enhancement to Chien et al.'s scheme enables users to change their passwords freely and securely without the help of a remote server, while also providing secure mutual authentication.
Abstract: Recently, Ku-Chen proposed an improvement to Chien et al.'s scheme to prevent from some weaknesses. However, the improved scheme is not only still susceptible to parallel session attack, but also insecure for changing the user's password in password change phase. Accordingly, the current paper presents an enhancement to resolve such problems. As a result, the proposed scheme enables users to change their passwords freely and securely without the help of a remote server, while also providing secure mutual authentication.

175 citations


Cites background from "Limitations of challenge-response e..."

  • [...]


References
More filters
Journal ArticleDOI

[...]

255 citations