Weaknesses and Improvements of Kuo-Lee's One-Time Password Authentication Scheme

被引:0
作者
Kim, Mijin [1 ]
Lee, Byunghee [1 ]
Kim, Seungjoo [1 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Sch Informat & Commun Engn, Suwon 440746, South Korea
来源
COMMUNICATION AND NETWORKING | 2009年 / 56卷
关键词
One-time password; authentication scheme; impersonation attack; PROTOCOL; ATTACKS;
D O I
10.1007/978-3-642-10844-0_49
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication of communicating entites and confidentiality of transmitted data are fundametal procedures to establish secure, communications over public insecure networks. Recently, many researchers proposed a variety of authentication schemes to confirm legitimate users. Among the authentication schemes, a one-time password authentication scheme requires less computation and considers the limitations of mobile devices. The purpose of a one-time password authentication is to make it more difficult to gain unauthorized access to restricted resources. This paper discusses the security of Kuo-Lee's one-time password authentication scheme. Kuo-Lee proposed to solve the security problem based on Tsuji-scheme one-time password authentication scheme. It was claimed that their proposed scheme could withstand a replay attack, a theft attack and a modification attack. Therefore, the attacker cannot successfully impersonate the user to log into the system. However, contrary to the claim, Kuo-Lee's scheme does not achieve its main security goal to authenticate communicating entities. We show that Kuo-Lee's scheme is still insecure under a modification attack, a replay attack and an impersonation attack, ill which ally attacker call violate the authentication goal of the scheme without, intercepting any transmitted message. We also propose a scheme that resolves the security flaws found in Kuo-Lee's scheme.
引用
收藏
页码:421 / 430
页数:10
相关论文
共 11 条
[1]   Robust and simple authentication protocol [J].
Chien, HY ;
Jan, JK .
COMPUTER JOURNAL, 2003, 46 (02) :193-201
[2]  
Haller N. M., 1994, Proceedings Internet Society Symposium on Network and Distributed System Security 1994, P151
[3]  
KUO WC, 2007, P 6 INT C MACH LEARN, P19
[4]   PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION [J].
LAMPORT, L .
COMMUNICATIONS OF THE ACM, 1981, 24 (11) :770-772
[5]   Impersonation attack on Two-Gene-Relation password authentication protocol (2GR) [J].
Lin, Chun-Li ;
Hung, Ching-Po .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2006, E89B (12) :3425-3427
[6]  
Lin CL, 2001, IEICE T COMMUN, VE84B, P2622
[7]  
Sandirigama M, 2000, IEICE T COMMUN, VE83B, P1363
[8]  
Shimizu A., 1991, Systems and Computers in Japan, V22, P32, DOI 10.1002/scj.4690220704
[9]  
Shimizu A, 1998, IEICE T COMMUN, VE81B, P1666
[10]  
Tsuji T, 2004, IEICE T COMMUN, VE87B, P523