完整後設資料紀錄
DC 欄位語言
dc.contributor.authorKu, Wei-Chi
dc.contributor.authorChiang, Min-Hung
dc.contributor.authorChang, Shen-Tien
dc.date.accessioned2009-06-02T06:40:34Z
dc.date.accessioned2020-05-25T06:42:27Z-
dc.date.available2009-06-02T06:40:34Z
dc.date.available2020-05-25T06:42:27Z-
dc.date.issued2006-10-16T05:33:45Z
dc.date.submitted2004-11-15
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/1535-
dc.description.abstractIn 2000, Peyravian and Zunic proposed an efficient hash-based password authentication scheme that can be easily implemented. Later, Lee, Li, and Hwang demonstrated that Peyravian- Zunic’s scheme is vulnerable to an off-line guessing attack, and then proposed an improved version. However, Ku, Chen, and Lee pointed out that their scheme can not resist an off-line guessing attack, a denial-of-service attack, and a stolen- verifier attack. Recently, Yoon, Ryu, and Yoo proposed an improved scheme of Lee-Li-Hwang’s scheme. Unfortunately, we find that Yoon-Ryu-Yoo’s scheme is still vulnerable to an off-line guessing attack and a stolen-verifier attack. Furthermore, their scheme can not achieve backward secrecy. Herein, we first briefly review Yoon-Ryu-Yoo’s scheme and then describe its weaknesses.
dc.description.sponsorship大同大學,台北市
dc.format.extent4p.
dc.format.extent569063 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries2004 ICS會議
dc.subjectPassword authentication
dc.subjecthash function
dc.subjectguessing attack
dc.subjectdenial-of-service attack
dc.subjectstolenverifier attack
dc.subject.otherInformation Security
dc.titleCryptanalysis of a New Password Authentication Scheme Using Hash Functions
分類:2004年 ICS 國際計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics002004000144.pdf555.73 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。