By Topic

Security enhancement for two remote user authentication schemes

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
3 Author(s)
Peng Shuanghe ; Res. Center of Inf. Security Archit., Beijing Jiaotong Univ., China ; Han Zhen ; Liu JiQiang

In 2002, Lee, Li, and Hwang proposed a hash-based password authentication scheme that is efficient and can be easily implemented. Recently Ku, Chen, and Lee demonstrated that Lee-Li-Hwang's hash-based password authentication scheme is vulnerable to the off line guessing attack, the denial of service attack, and the stolen verifier attack. In 2003, Chih-Wei Lin et al. proposed a security enhancement for optimal strong password authentication protocol. This paper, however, will demonstrate that Chih-Wei Lin's scheme is vulnerable to the denial of service attack. In this article, we shall propose improved schemes to these two remote user authentication schemes, which make them able to withstand denial of service attack and have about the same computational cost as originals.

Published in:

Signal Processing, 2004. Proceedings. ICSP '04. 2004 7th International Conference on  (Volume:3 )

Date of Conference:

31 Aug.-4 Sept. 2004