Cryptanalysis of a user authentication scheme using hash functions

  • Authors:
  • Sung-Woon Lee;Hyun-Sung Kim;Kee-Young Yoo

  • Affiliations:
  • Kyungpook National University Taegu, Korea;Kyungil University Kyungsansi, Kyungsangpookdo, Korea;Kyungpook National University Taegu, Korea

  • Venue:
  • ACM SIGOPS Operating Systems Review
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recently, Lee et al. proposed an improved scheme, called LLH scheme, to solve a security problem of guessing attack in the Peyravian-Zunic password scheme. The scheme comprises a password authentication protocol and a password change protocol. However, we discuss that the LLH scheme has several security problems: the scheme is still vulnerable to the guessing attack; the scheme cannot also prevent the stolen-verifier attack; the password change protocol in scheme is vulnerable to a denial of service attack.