English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 57042/90725 (63%)
造訪人次 : 12435468      線上人數 : 78
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    請使用永久網址來引用或連結此文件: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/92795

    題名: Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Preserving User Privacy
    作者: Peng, Jian-Wen;Horng, Wen-Bing;Chiu, Ying-Ching;Liu, Chao-Sheng
    貢獻者: 淡江大學資訊工程學系
    關鍵詞: Authentication;Cryptanalysis;Perfect Forward Secrecy;Session Key;Smart Card
    日期: 2013-09
    上傳時間: 2013-10-23
    出版者: 新北市:淡江大學
    摘要: Remote user authentication is an essential part in electronic commerce to identify legitimate users over the Internet. However, how to protect user privacy in the authentication has become an important issue recently. Therefore, many secure authentication schemes with smart cards have been proposed. In this paper, we will analyze the security weaknesses of two recently proposed authentication schemes for preserving user privacy. First, Chang et al. (2011) proposed a robust and efficient remote user authentication scheme to provide user anonymity. However, this scheme fails to protect user privacy in terms of anonymity and traceability. In addition, it is vulnerable to the server counterfeit attack and it does not provide perfect forward secrecy for session keys. Furthermore, if the smart card is lost, it will suffer from the offline password guessing attack as well as the user impersonation attack. Second, Wen and Li (2012) recently presented an improved dynamic ID-based authentication scheme with key agreement. However, this scheme is vulnerable to traceability. In addition, it does not support perfect forward secrecy for session keys. Furthermore, the insecure offline password change phase and online secret renewal phase will result in the denial of service attack.
    關聯: Journal of Applied Science and Engineering=淡江理工學刊 16(3), pp.277-286
    DOI: 10.6180/jase.2013.16.3.07
    顯示於類別:[資訊工程學系暨研究所] 期刊論文


    檔案 描述 大小格式瀏覽次數



    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回饋