Skip to main content
13
Views
259
Downloads
Reviewed article

An Efficient and Practical Remote User Authentication Scheme

How to cite:
Ya-Fen Chang, Chin-Chen Chang
"An Efficient and Practical Remote User Authentication Scheme"
Information & Security: An International Journal,
15
no. 1
(2004):
75-88.
http://dx.doi.org/10.11610/isij.1505

An Efficient and Practical Remote User Authentication Scheme

Source:

Information & Security: An International Journal,
Volume: 15,
Issue1,
p.75-88
(2004)

Abstract:

In 2000, Peyravian and Zunic proposed a simple and efficient password authentication scheme based on the collision-resistant hash function. Later, Hwang and Yeh indicated that Peyravian and Zunic’s scheme is insecure and proposed an improvement by using the server’s public key. Nevertheless, in practice, services that do not use public keys are quite often superior to PKIs. At the same time, Lee, Li and Hwang indicated that Peyravian and Zunic’s scheme suffers from off-line password guessing attacks and presented an improved version. However, Lee-Li-Hwang’s proposed scheme is still vulnerable to the same attacks and denial-of-service attacks. Therefore, this article presents a secure and efficient improvement.

13
Views
259
Downloads