Journal ArticleDOI
Limitations of challenge-response entity authentication
Reads0
Chats0
TLDR
This work considers two basic versions of the challenge-response authentication protocol, and exhibits both a method of attack and a simple modification preventing such attacks.Abstract:
We consider two basic versions of the challenge-response authentication protocol, and exhibit both a method of attack and a simple modification preventing such attacks. We go on to consider three variants of the basic protocols and show that one of them is completely insecure.read more
Citations
More filters
Journal ArticleDOI
Improvements on Hsiang and Shih's Remote User Authentication Scheme Using Smart Cards
Jung-Yoon Kim,Hyoung-Kee Choi +1 more
TL;DR: This paper demonstrates how their user authentication scheme can be compromised and proposes an improved scheme based on the Rabin cryptosystem to overcome the weaknesses, and formally proves the security of the proposed scheme using the BAN logic.
A Multi-Party User Authentication and Key Agreement Protocol Based on Public Key Cryptosystem
TL;DR: The problem of multi- party user authentication and key agreement whereby a party gains assurance of the identity of other parties involved in a protocol for preventing impersonation and unauthorized access is addressed.
Posted Content
The Modified Scheme is still vulnerable to the parallel Session Attack
TL;DR: This paper analyzes the modified scheme of Yoon et al. still vulnerable to parallel session attack and proposes a new efficient remote user authentication scheme using smart cards.
Book ChapterDOI
A Smart Card Based Lightweight Multi Server Encryption Scheme
TL;DR: In this article, the authors proposed a smart token based scheme for mutual authentication between the user and the service provider, which applies modified Diffie-Hellman protocol to keep the proposed solution lightweight for use over variety of devices.
Book ChapterDOI
A New Remote Mutual Authentication Scheme for WI-FI Enabledhand-Held Devices
TL;DR: This paper proposes a new remote mutual authentication scheme in wireless environment without maintaining the password table based on ElGamal’s, which provides high security and mutual authentication at a reasonable computational cost.