A secure user authentication scheme using hash functions
Recently, Lee et al. proposed an improvement on Peyravian and Zunic scheme to make the protocol withstand the guessing attack. However, their scheme suffers from a denial of service attack. In this paper, we show that an attacker can easily prevent the normal use of communication facilities by perfo...
Gespeichert in:
Veröffentlicht in: | Operating systems review 2004-04, Vol.38 (2), p.62-68 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 68 |
---|---|
container_issue | 2 |
container_start_page | 62 |
container_title | Operating systems review |
container_volume | 38 |
creator | YOON, Eun-Jun RYU, Eun-Kyung YOO, Kee-Young |
description | Recently, Lee et al. proposed an improvement on Peyravian and Zunic scheme to make the protocol withstand the guessing attack. However, their scheme suffers from a denial of service attack. In this paper, we show that an attacker can easily prevent the normal use of communication facilities by performing the attack. We also propose an enhancement of the scheme to isolate such a problem. |
doi_str_mv | 10.1145/991130.991135 |
format | Article |
fullrecord | <record><control><sourceid>pascalfrancis_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1145_991130_991135</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>15630678</sourcerecordid><originalsourceid>FETCH-LOGICAL-c182t-fcb8040d087a60a0d19251515334612fa6361cb32ed265020162111430ce31bf3</originalsourceid><addsrcrecordid>eNpFj81LxDAQxYMoWFeP3nPx2HUm02TT47L4BQteFLyVNE1sZbe7ZNqD_71dK8gc3sB7M7yfELcIS8RC35clIsHyV_SZyLAsKNfWfJyLDNBMe2nhUlwxfwGgRYOZsGvJwY8pyJFDkm4c2tAPnXdDd-gl-zbsT1bXf8rWcSvj2PuTxdfiIrodh5s_XYj3x4e3zXO-fX162ay3uUerhjz62kIBDdiVM-CgwVJpnIaoMKiiM2TQ16RCo4wGNfVUONEQ-EBYR1qIfP7r04E5hVgdU7d36btCqE7Y1Yw9i57yd3P-6Ni7XUyu9x3_H2lDYFaWfgB5vFVC</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>A secure user authentication scheme using hash functions</title><source>ACM Digital Library</source><creator>YOON, Eun-Jun ; RYU, Eun-Kyung ; YOO, Kee-Young</creator><creatorcontrib>YOON, Eun-Jun ; RYU, Eun-Kyung ; YOO, Kee-Young</creatorcontrib><description>Recently, Lee et al. proposed an improvement on Peyravian and Zunic scheme to make the protocol withstand the guessing attack. However, their scheme suffers from a denial of service attack. In this paper, we show that an attacker can easily prevent the normal use of communication facilities by performing the attack. We also propose an enhancement of the scheme to isolate such a problem.</description><identifier>ISSN: 0163-5980</identifier><identifier>EISSN: 1943-586X</identifier><identifier>DOI: 10.1145/991130.991135</identifier><identifier>CODEN: OSRED8</identifier><language>eng</language><publisher>New York, NY: Association for Computing Machinery</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Cryptography ; Exact sciences and technology ; Information, signal and communications theory ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Signal and communications theory ; Software ; Telecommunications and information theory</subject><ispartof>Operating systems review, 2004-04, Vol.38 (2), p.62-68</ispartof><rights>2004 INIST-CNRS</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c182t-fcb8040d087a60a0d19251515334612fa6361cb32ed265020162111430ce31bf3</citedby><cites>FETCH-LOGICAL-c182t-fcb8040d087a60a0d19251515334612fa6361cb32ed265020162111430ce31bf3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27922,27923</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=15630678$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>YOON, Eun-Jun</creatorcontrib><creatorcontrib>RYU, Eun-Kyung</creatorcontrib><creatorcontrib>YOO, Kee-Young</creatorcontrib><title>A secure user authentication scheme using hash functions</title><title>Operating systems review</title><description>Recently, Lee et al. proposed an improvement on Peyravian and Zunic scheme to make the protocol withstand the guessing attack. However, their scheme suffers from a denial of service attack. In this paper, we show that an attacker can easily prevent the normal use of communication facilities by performing the attack. We also propose an enhancement of the scheme to isolate such a problem.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Cryptography</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Signal and communications theory</subject><subject>Software</subject><subject>Telecommunications and information theory</subject><issn>0163-5980</issn><issn>1943-586X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2004</creationdate><recordtype>article</recordtype><recordid>eNpFj81LxDAQxYMoWFeP3nPx2HUm02TT47L4BQteFLyVNE1sZbe7ZNqD_71dK8gc3sB7M7yfELcIS8RC35clIsHyV_SZyLAsKNfWfJyLDNBMe2nhUlwxfwGgRYOZsGvJwY8pyJFDkm4c2tAPnXdDd-gl-zbsT1bXf8rWcSvj2PuTxdfiIrodh5s_XYj3x4e3zXO-fX162ay3uUerhjz62kIBDdiVM-CgwVJpnIaoMKiiM2TQ16RCo4wGNfVUONEQ-EBYR1qIfP7r04E5hVgdU7d36btCqE7Y1Yw9i57yd3P-6Ni7XUyu9x3_H2lDYFaWfgB5vFVC</recordid><startdate>200404</startdate><enddate>200404</enddate><creator>YOON, Eun-Jun</creator><creator>RYU, Eun-Kyung</creator><creator>YOO, Kee-Young</creator><general>Association for Computing Machinery</general><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>200404</creationdate><title>A secure user authentication scheme using hash functions</title><author>YOON, Eun-Jun ; RYU, Eun-Kyung ; YOO, Kee-Young</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c182t-fcb8040d087a60a0d19251515334612fa6361cb32ed265020162111430ce31bf3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Cryptography</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Signal and communications theory</topic><topic>Software</topic><topic>Telecommunications and information theory</topic><toplevel>online_resources</toplevel><creatorcontrib>YOON, Eun-Jun</creatorcontrib><creatorcontrib>RYU, Eun-Kyung</creatorcontrib><creatorcontrib>YOO, Kee-Young</creatorcontrib><collection>Pascal-Francis</collection><collection>CrossRef</collection><jtitle>Operating systems review</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>YOON, Eun-Jun</au><au>RYU, Eun-Kyung</au><au>YOO, Kee-Young</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A secure user authentication scheme using hash functions</atitle><jtitle>Operating systems review</jtitle><date>2004-04</date><risdate>2004</risdate><volume>38</volume><issue>2</issue><spage>62</spage><epage>68</epage><pages>62-68</pages><issn>0163-5980</issn><eissn>1943-586X</eissn><coden>OSRED8</coden><abstract>Recently, Lee et al. proposed an improvement on Peyravian and Zunic scheme to make the protocol withstand the guessing attack. However, their scheme suffers from a denial of service attack. In this paper, we show that an attacker can easily prevent the normal use of communication facilities by performing the attack. We also propose an enhancement of the scheme to isolate such a problem.</abstract><cop>New York, NY</cop><pub>Association for Computing Machinery</pub><doi>10.1145/991130.991135</doi><tpages>7</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0163-5980 |
ispartof | Operating systems review, 2004-04, Vol.38 (2), p.62-68 |
issn | 0163-5980 1943-586X |
language | eng |
recordid | cdi_crossref_primary_10_1145_991130_991135 |
source | ACM Digital Library |
subjects | Applied sciences Computer science control theory systems Cryptography Exact sciences and technology Information, signal and communications theory Memory and file management (including protection and security) Memory organisation. Data processing Signal and communications theory Software Telecommunications and information theory |
title | A secure user authentication scheme using hash functions |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T14%3A31%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20secure%20user%20authentication%20scheme%20using%20hash%20functions&rft.jtitle=Operating%20systems%20review&rft.au=YOON,%20Eun-Jun&rft.date=2004-04&rft.volume=38&rft.issue=2&rft.spage=62&rft.epage=68&rft.pages=62-68&rft.issn=0163-5980&rft.eissn=1943-586X&rft.coden=OSRED8&rft_id=info:doi/10.1145/991130.991135&rft_dat=%3Cpascalfrancis_cross%3E15630678%3C/pascalfrancis_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |