作者: Jung-Yoon KIM , Hyoung-Kee CHOI
DOI: 10.1587/TRANSINF.E95.D.2393
关键词: Password policy 、 Multi-factor authentication 、 Password cracking 、 Authentication 、 S/KEY 、 Network Access Control 、 One-time password 、 Computer security 、 Password 、 Authentication protocol 、 Data Authentication Algorithm 、 Computer science 、 Access control 、 Public-key cryptography 、 Smart card 、 Rabin cryptosystem 、 Challenge–response authentication
摘要: Hsiang and Shih discovered that Yoon et al.’s user authentication scheme was vulnerable to parallel session attack, impersonation offline password guessing attack. They proposed an improved prevent these attacks. Shih’s is still susceptible attack server In this paper, we demonstrate how their can be compromised then propose based on the Rabin cryptosystem overcome weaknesses. Furthermore, discuss reason why should use asymmetric encryption algorithm secure a password-based remote using smart cards. We formally prove security of our BAN logic. key words: Network-level protection, authentication, security,