A remote user authentication scheme using hash functions
ACM SIGOPS Operating Systems Review
Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme
ACM SIGOPS Operating Systems Review
A secure user authentication scheme using hash functions
ACM SIGOPS Operating Systems Review
A new method for using hash functions to solve remote user authentication
Computers and Electrical Engineering
Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Secure hash-based password authentication protocol using smartcards
ICCSA'11 Proceedings of the 2011 international conference on Computational science and Its applications - Volume Part V
An efficient and complete remote user authentication scheme using smart cards
Mathematical and Computer Modelling: An International Journal
Hi-index | 0.00 |
In 2000, Peyravian and Zunic proposed an efficient hash-based password authentication scheme that can be easily implemented. Later, Lee, Li, and Hwang demonstrated that Peyravian-Zunic's scheme is vulnerable to an off-line guessing attack, and then proposed an improved version. However, Ku, Chen, and Lee pointed out that their scheme can not resist an off-line guessing attack, a denial-of-service attack, and a stolen-verifier attack. Recently, Yoon, Ryu, and Yoo proposed an improved scheme of Lee-Li-Hwang's scheme. Unfortunately, we find that Yoon-Ryu-Yoo's scheme is still vulnerable to an off-line guessing attack and a stolen-verifier attack. Furthermore, their scheme can not achieve backward secrecy. Herein, we first briefly review Yoon-Ryu-Yoo's scheme and then describe its weaknesses.