Cryptanalysis of Verifier-Free Password Authentication Schemes Using Smart Cards
碩士 === 輔仁大學 === 資訊工程學系 === 93 === A common feature of conventional password authentication schemes is that a password verification table, which contains the verifiers of users’ passwords, should be securely stored in the server. If the password verification table is stolen or modified by the adversa...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/30051392783914948453 |
id |
ndltd-TW-093FJU00392054 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-093FJU003920542015-10-13T13:04:19Z http://ndltd.ncl.edu.tw/handle/30051392783914948453 Cryptanalysis of Verifier-Free Password Authentication Schemes Using Smart Cards 植基於智慧卡之免儲存驗證資訊的通行碼身份認證協定分析 Hsiu-Mei Chuang 莊秀美 碩士 輔仁大學 資訊工程學系 93 A common feature of conventional password authentication schemes is that a password verification table, which contains the verifiers of users’ passwords, should be securely stored in the server. If the password verification table is stolen or modified by the adversary, the sys-tem is under danger. To solve such problems, many verifier-free password authentication schemes have been proposed. In 2000, Hwang and Li proposed a verifier-free password au-thentication scheme using smart cards based on ElGamal’s public-key technique. Independ-ently, Sun also proposed a verifier-free password authentication scheme using smart cards based on cryptographic hash functions. However, both Hwang-Li’s scheme and Sun’s scheme were vulnerable to several attacks. Later, Chien, Jan and Tseng proposed an improved version of Hwang-Li’s scheme. In addition, Wu and Chieu also proposed an enhanced version of Sun’s scheme in that the user can freely choose and change his password. However, the au-thors themselves showed that their scheme is vulnerable to a forgery attack and then proposed an improved scheme. Since Chien-Jan-Tseng’s scheme and Wu-Chieu’s improved scheme are designed for the single-server architecture, it is inconvenient for the user to access the multi-ple servers in that he has to register with each server individually and possibly should re-member different identities and passwords. And therefore, Juang proposed an efficient veri-fier-free password authenticated key agreement scheme using smart cards for the multi-server architecture. However, we find that these newer schemes still have several weaknesses and drawbacks. In this thesis, we show that Chien-Jan-Tseng’s scheme is vulnerable to a reflection attack, a privileged insider’s attack and is not reparable, and Wu-Chieu’s improved scheme is vulnerable to a stolen smart card attack, a forgery attack, a privileged insider’s attack and an off-line password guessing attack. And, we also demonstrate that Juang’s scheme is vulner-able to a privileged insider’s attack and is not reparable. Furthermore, Juang’s scheme does not provide forward secrecy and the user eviction mechanism. Wei-Chi Ku 顧維祺 2005 學位論文 ; thesis 55 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 輔仁大學 === 資訊工程學系 === 93 === A common feature of conventional password authentication schemes is that a password verification table, which contains the verifiers of users’ passwords, should be securely stored in the server. If the password verification table is stolen or modified by the adversary, the sys-tem is under danger. To solve such problems, many verifier-free password authentication schemes have been proposed. In 2000, Hwang and Li proposed a verifier-free password au-thentication scheme using smart cards based on ElGamal’s public-key technique. Independ-ently, Sun also proposed a verifier-free password authentication scheme using smart cards based on cryptographic hash functions. However, both Hwang-Li’s scheme and Sun’s scheme were vulnerable to several attacks. Later, Chien, Jan and Tseng proposed an improved version of Hwang-Li’s scheme. In addition, Wu and Chieu also proposed an enhanced version of Sun’s scheme in that the user can freely choose and change his password. However, the au-thors themselves showed that their scheme is vulnerable to a forgery attack and then proposed an improved scheme. Since Chien-Jan-Tseng’s scheme and Wu-Chieu’s improved scheme are designed for the single-server architecture, it is inconvenient for the user to access the multi-ple servers in that he has to register with each server individually and possibly should re-member different identities and passwords. And therefore, Juang proposed an efficient veri-fier-free password authenticated key agreement scheme using smart cards for the multi-server architecture. However, we find that these newer schemes still have several weaknesses and drawbacks. In this thesis, we show that Chien-Jan-Tseng’s scheme is vulnerable to a reflection attack, a privileged insider’s attack and is not reparable, and Wu-Chieu’s improved scheme is vulnerable to a stolen smart card attack, a forgery attack, a privileged insider’s attack and an off-line password guessing attack. And, we also demonstrate that Juang’s scheme is vulner-able to a privileged insider’s attack and is not reparable. Furthermore, Juang’s scheme does not provide forward secrecy and the user eviction mechanism.
|
author2 |
Wei-Chi Ku |
author_facet |
Wei-Chi Ku Hsiu-Mei Chuang 莊秀美 |
author |
Hsiu-Mei Chuang 莊秀美 |
spellingShingle |
Hsiu-Mei Chuang 莊秀美 Cryptanalysis of Verifier-Free Password Authentication Schemes Using Smart Cards |
author_sort |
Hsiu-Mei Chuang |
title |
Cryptanalysis of Verifier-Free Password Authentication Schemes Using Smart Cards |
title_short |
Cryptanalysis of Verifier-Free Password Authentication Schemes Using Smart Cards |
title_full |
Cryptanalysis of Verifier-Free Password Authentication Schemes Using Smart Cards |
title_fullStr |
Cryptanalysis of Verifier-Free Password Authentication Schemes Using Smart Cards |
title_full_unstemmed |
Cryptanalysis of Verifier-Free Password Authentication Schemes Using Smart Cards |
title_sort |
cryptanalysis of verifier-free password authentication schemes using smart cards |
publishDate |
2005 |
url |
http://ndltd.ncl.edu.tw/handle/30051392783914948453 |
work_keys_str_mv |
AT hsiumeichuang cryptanalysisofverifierfreepasswordauthenticationschemesusingsmartcards AT zhuāngxiùměi cryptanalysisofverifierfreepasswordauthenticationschemesusingsmartcards AT hsiumeichuang zhíjīyúzhìhuìkǎzhīmiǎnchǔcúnyànzhèngzīxùndetōngxíngmǎshēnfènrènzhèngxiédìngfēnxī AT zhuāngxiùměi zhíjīyúzhìhuìkǎzhīmiǎnchǔcúnyànzhèngzīxùndetōngxíngmǎshēnfènrènzhèngxiédìngfēnxī |
_version_ |
1717730253378420736 |