Earticle

현재 위치 Home

Weaknesses and Improvements of a One-time Password Authentication Scheme

첫 페이지 보기
  • 발행기관
    보안공학연구지원센터(IJFGCN) 바로가기
  • 간행물
    International Journal of Future Generation Communication and Networking 바로가기
  • 통권
    vol.2 no.4 (2009.12)바로가기
  • 페이지
    pp.29-38
  • 저자
    Mijin Kim, Byunghee Lee, Seungjoo Kim, Dongho Won
  • 언어
    영어(ENG)
  • URL
    https://www.earticle.net/Article/A147777

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

원문정보

초록

영어
Authentication of communicating entities and confidentiality of transmitted data are fundamental procedures to establish secure communications over public insecure networks. Recently, many researchers proposed a variety of authentication schemes to confirm legitimate users. Among the authentication schemes, a one-time password authentication scheme requires less computation and considers the limitations of mobile devices. The purpose of a one-time password authentication is to make it more difficult to gain unauthorized access to restricted resources. This paper discusses the security of Kuo-Lee's one-time password authentication scheme. Kuo-Lee proposed to solve the security problem based on Tsuji-Shimizu's one-time password authentication scheme. It was claimed that their proposed scheme could withstand a replay attack, a theft attack and a modification attack. Therefore, the attacker cannot successfully impersonate the user to log into the system. However, contrary to the claim, Kuo-Lee's scheme does not achieve its main security goal to authenticate communicating entities. We show that Kuo-Lee's scheme is still insecure under a modification attack, a replay attack and an impersonation attack, in which any attacker can violate the authentication goal of the scheme without intercepting any transmitted message. We also propose a scheme that resolves the security flaws found in Kuo-Lee's scheme.

목차

Abstract
 1. Introduction
 2. Review of Kuo-Lee's scheme
  2.1 Registration phase
  2.2 Authentication phase
 3. Attacks on Kuo-Lee's scheme
  3.1. Modification attack and replay attack
  3.2. Impersonation attack
 4. Proposed scheme
  4.1. Registration Phase
  4.2. Authentication phase
 5. Security analysis
  5.1 Resistance to Modification Attack
  5.2 Resistance to Replay Attack and Impersonation Attack
 6. Conclusion
 References

키워드

One-time password authentication scheme impersonation attack.

저자

  • Mijin Kim, Byunghee Lee [ School of Information and Communication Engineering, Sungkyunkwan University ]
  • Seungjoo Kim [ School of Information and Communication Engineering, Sungkyunkwan University ]
  • Dongho Won [ School of Information and Communication Engineering, Sungkyunkwan University ]

참고문헌

자료제공 : 네이버학술정보

간행물 정보

발행기관

  • 발행기관명
    보안공학연구지원센터(IJFGCN) [Science & Engineering Research Support Center, Republic of Korea(IJFGCN)]
  • 설립연도
    2006
  • 분야
    공학>컴퓨터학
  • 소개
    1. 보안공학에 대한 각종 조사 및 연구 2. 보안공학에 대한 응용기술 연구 및 발표 3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최 4. 보안공학 기술의 상호 협조 및 정보교환 5. 보안공학에 관한 표준화 사업 및 규격의 제정 6. 보안공학에 관한 산학연 협동의 증진 7. 국제적 학술 교류 및 기술 협력 8. 보안공학에 관한 논문지 발간 9. 기타 본 회 목적 달성에 필요한 사업

간행물

  • 간행물명
    International Journal of Future Generation Communication and Networking
  • 간기
    격월간
  • pISSN
    2233-7857
  • 수록기간
    2008~2016
  • 십진분류
    KDC 505 DDC 605

이 권호 내 다른 논문 / International Journal of Future Generation Communication and Networking vol.2 no.4

    피인용수 : 0(자료제공 : 네이버학술정보)

    함께 이용한 논문 이 논문을 다운로드한 분들이 이용한 다른 논문입니다.

      페이지 저장