Weaknesses and Improvements of Kuo-Lee's One-Time Password Authentication Scheme

被引:0
作者
Kim, Mijin [1 ]
Lee, Byunghee [1 ]
Kim, Seungjoo [1 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Sch Informat & Commun Engn, Suwon 440746, South Korea
来源
COMMUNICATION AND NETWORKING | 2009年 / 56卷
关键词
One-time password; authentication scheme; impersonation attack; PROTOCOL; ATTACKS;
D O I
10.1007/978-3-642-10844-0_49
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication of communicating entites and confidentiality of transmitted data are fundametal procedures to establish secure, communications over public insecure networks. Recently, many researchers proposed a variety of authentication schemes to confirm legitimate users. Among the authentication schemes, a one-time password authentication scheme requires less computation and considers the limitations of mobile devices. The purpose of a one-time password authentication is to make it more difficult to gain unauthorized access to restricted resources. This paper discusses the security of Kuo-Lee's one-time password authentication scheme. Kuo-Lee proposed to solve the security problem based on Tsuji-scheme one-time password authentication scheme. It was claimed that their proposed scheme could withstand a replay attack, a theft attack and a modification attack. Therefore, the attacker cannot successfully impersonate the user to log into the system. However, contrary to the claim, Kuo-Lee's scheme does not achieve its main security goal to authenticate communicating entities. We show that Kuo-Lee's scheme is still insecure under a modification attack, a replay attack and an impersonation attack, ill which ally attacker call violate the authentication goal of the scheme without, intercepting any transmitted message. We also propose a scheme that resolves the security flaws found in Kuo-Lee's scheme.
引用
收藏
页码:421 / 430
页数:10
相关论文
共 11 条
[11]  
TSUJI T, 2002, 200230 IEICE OIS