A remote user authentication scheme using hash functions

  • Authors:
  • Cheng-Chi Lee;Li-Hua Li;Min-Shiang Hwang

  • Affiliations:
  • National Chiao-Tung University‡, Taiwan, R.O.C.;Chaoyang University of Technology† Gifeng E. Rd., Wufeng, Taichung County, R.O.C.;Chaoyang University of Technology† Gifeng E. Rd., Wufeng, Taichung County, R.O.C.

  • Venue:
  • ACM SIGOPS Operating Systems Review
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recently, Peyravian and Zunic proposed a simple but efficient password authentication system. Their scheme is based on the collision-resistant hash function, such as SHA-1. Their scheme did not use any cryptosystems (such as DES, RSA, etc.). However, their scheme is vulnerable to guess attack. An attacker can easily obtain a user's password by guessing attack and then impersonate the user to login and access resources in the server. To overcome the vulnerability of their scheme, we propose an improved scheme to enhance security of their scheme in this article.