Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme

  • Authors:
  • Wei-Chi Ku;Min-Hung Chiang;Shen-Tien Chang

  • Affiliations:
  • Fu Jen Catholic University, Hsinchuang, Taipei County, Taiwan, R.O.C.;Fu Jen Catholic University, Hsinchuang, Taipei County, Taiwan, R.O.C.;Fu Jen Catholic University, Hsinchuang, Taipei County, Taiwan, R.O.C.

  • Venue:
  • ACM SIGOPS Operating Systems Review
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

In 2000, Peyravian and Zunic proposed an efficient hash-based password authentication scheme that can be easily implemented. Later, Lee, Li, and Hwang demonstrated that Peyravian-Zunic's scheme is vulnerable to an off-line guessing attack, and then proposed an improved version. However, Ku, Chen, and Lee pointed out that their scheme can not resist an off-line guessing attack, a denial-of-service attack, and a stolen-verifier attack. Recently, Yoon, Ryu, and Yoo proposed an improved scheme of Lee-Li-Hwang's scheme. Unfortunately, we find that Yoon-Ryu-Yoo's scheme is still vulnerable to an off-line guessing attack and a stolen-verifier attack. Furthermore, their scheme can not achieve backward secrecy. Herein, we first briefly review Yoon-Ryu-Yoo's scheme and then describe its weaknesses.