scispace - formally typeset
Journal ArticleDOI

Limitations of challenge-response entity authentication

Chris J. Mitchell
- 17 Aug 1989 - 
- Vol. 25, Iss: 17, pp 1195-1196
Reads0
Chats0
TLDR
This work considers two basic versions of the challenge-response authentication protocol, and exhibits both a method of attack and a simple modification preventing such attacks.
Abstract
We consider two basic versions of the challenge-response authentication protocol, and exhibit both a method of attack and a simple modification preventing such attacks. We go on to consider three variants of the basic protocols and show that one of them is completely insecure.

read more

Citations
More filters
Proceedings ArticleDOI

Weaknesses of the Yoon-Kim-Yoo remote user authentication scheme using smart cards

TL;DR: This paper presents some flaws in Yoon-Kim-Yoo's remote user authentication scheme and proposes cryptanalysis, which contributes important heuristics on the secure concern when researchers designRemote user authentication schemes.
Journal Article

Efficient multi-party challenge-response protocols for entity authentication

TL;DR: It is proved that the lower bound on the number of messages of multi-party challenge-response protocols is 2n − 1, where n is the numberof participants of the protocol, and two protocols are proposed that achieve this lower bound.
Posted Content

On the Weaknesses and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards

TL;DR: This paper aims to show that the modified scheme proposed by W. C. Ku and S. M. Chen is still vulnerable to the password guessing attack and the insider attack.
Journal ArticleDOI

Parsing ambiguities in authentication and key establishment protocols

TL;DR: In this article, a new class of attacks against authentication and authenticated key establishment protocols is described, which are called parsing ambiguity attacks, which apply to a very wide range of such protocols, including those specified in a number of international standards.

User Authentication and Related Topics: An Annotated Bibliography

TL;DR: This bibliography is the result of the examination of the current state of user authentication, with an emphasis on password authentication, and believes that it is representative of the most important works in the area in recent years.
References
Related Papers (5)