Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme

  • Authors:
  • Wei-Chi Ku;Chien-Ming Chen;Hui-Lung Lee

  • Affiliations:
  • Fu Jen Catholic University, Hsinchuang, Taipei County, Taiwan, R.O.C.;Fu Jen Catholic University, Hsinchuang, Taipei County, Taiwan, R.O.C.;Fu Jen Catholic University, Hsinchuang, Taipei County, Taiwan, R.O.C.

  • Venue:
  • ACM SIGOPS Operating Systems Review
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

Many password authentication schemes employ hash functions as their basic building blocks to achieve better efficiency. In 2000, Peyravian and Zunic proposed a hash-based password authentication scheme that is efficient and can be easily implemented. Recently, Lee, Li, and Hwang demonstrated that Peyravian-Zunic's hash-based password authentication scheme is vulnerable to the off-line guessing attack, and then proposed an improved version. In this article, we show that their improved scheme is still vulnerable to the off-line guessing attack, the denial-of-service attack, and the stolen-verifier attack.