A secure user authentication scheme using hash functions

Recently, Lee et al. proposed an improvement on Peyravian and Zunic scheme to make the protocol withstand the guessing attack. However, their scheme suffers from a denial of service attack. In this paper, we show that an attacker can easily prevent the normal use of communication facilities by perfo...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Operating systems review 2004-04, Vol.38 (2), p.62-68
Hauptverfasser: YOON, Eun-Jun, RYU, Eun-Kyung, YOO, Kee-Young
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 68
container_issue 2
container_start_page 62
container_title Operating systems review
container_volume 38
creator YOON, Eun-Jun
RYU, Eun-Kyung
YOO, Kee-Young
description Recently, Lee et al. proposed an improvement on Peyravian and Zunic scheme to make the protocol withstand the guessing attack. However, their scheme suffers from a denial of service attack. In this paper, we show that an attacker can easily prevent the normal use of communication facilities by performing the attack. We also propose an enhancement of the scheme to isolate such a problem.
doi_str_mv 10.1145/991130.991135
format Article
fullrecord <record><control><sourceid>pascalfrancis_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1145_991130_991135</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>15630678</sourcerecordid><originalsourceid>FETCH-LOGICAL-c182t-fcb8040d087a60a0d19251515334612fa6361cb32ed265020162111430ce31bf3</originalsourceid><addsrcrecordid>eNpFj81LxDAQxYMoWFeP3nPx2HUm02TT47L4BQteFLyVNE1sZbe7ZNqD_71dK8gc3sB7M7yfELcIS8RC35clIsHyV_SZyLAsKNfWfJyLDNBMe2nhUlwxfwGgRYOZsGvJwY8pyJFDkm4c2tAPnXdDd-gl-zbsT1bXf8rWcSvj2PuTxdfiIrodh5s_XYj3x4e3zXO-fX162ay3uUerhjz62kIBDdiVM-CgwVJpnIaoMKiiM2TQ16RCo4wGNfVUONEQ-EBYR1qIfP7r04E5hVgdU7d36btCqE7Y1Yw9i57yd3P-6Ni7XUyu9x3_H2lDYFaWfgB5vFVC</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>A secure user authentication scheme using hash functions</title><source>ACM Digital Library</source><creator>YOON, Eun-Jun ; RYU, Eun-Kyung ; YOO, Kee-Young</creator><creatorcontrib>YOON, Eun-Jun ; RYU, Eun-Kyung ; YOO, Kee-Young</creatorcontrib><description>Recently, Lee et al. proposed an improvement on Peyravian and Zunic scheme to make the protocol withstand the guessing attack. However, their scheme suffers from a denial of service attack. In this paper, we show that an attacker can easily prevent the normal use of communication facilities by performing the attack. We also propose an enhancement of the scheme to isolate such a problem.</description><identifier>ISSN: 0163-5980</identifier><identifier>EISSN: 1943-586X</identifier><identifier>DOI: 10.1145/991130.991135</identifier><identifier>CODEN: OSRED8</identifier><language>eng</language><publisher>New York, NY: Association for Computing Machinery</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Cryptography ; Exact sciences and technology ; Information, signal and communications theory ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Signal and communications theory ; Software ; Telecommunications and information theory</subject><ispartof>Operating systems review, 2004-04, Vol.38 (2), p.62-68</ispartof><rights>2004 INIST-CNRS</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c182t-fcb8040d087a60a0d19251515334612fa6361cb32ed265020162111430ce31bf3</citedby><cites>FETCH-LOGICAL-c182t-fcb8040d087a60a0d19251515334612fa6361cb32ed265020162111430ce31bf3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27922,27923</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=15630678$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>YOON, Eun-Jun</creatorcontrib><creatorcontrib>RYU, Eun-Kyung</creatorcontrib><creatorcontrib>YOO, Kee-Young</creatorcontrib><title>A secure user authentication scheme using hash functions</title><title>Operating systems review</title><description>Recently, Lee et al. proposed an improvement on Peyravian and Zunic scheme to make the protocol withstand the guessing attack. However, their scheme suffers from a denial of service attack. In this paper, we show that an attacker can easily prevent the normal use of communication facilities by performing the attack. We also propose an enhancement of the scheme to isolate such a problem.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Cryptography</subject><subject>Exact sciences and technology</subject><subject>Information, signal and communications theory</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Signal and communications theory</subject><subject>Software</subject><subject>Telecommunications and information theory</subject><issn>0163-5980</issn><issn>1943-586X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2004</creationdate><recordtype>article</recordtype><recordid>eNpFj81LxDAQxYMoWFeP3nPx2HUm02TT47L4BQteFLyVNE1sZbe7ZNqD_71dK8gc3sB7M7yfELcIS8RC35clIsHyV_SZyLAsKNfWfJyLDNBMe2nhUlwxfwGgRYOZsGvJwY8pyJFDkm4c2tAPnXdDd-gl-zbsT1bXf8rWcSvj2PuTxdfiIrodh5s_XYj3x4e3zXO-fX162ay3uUerhjz62kIBDdiVM-CgwVJpnIaoMKiiM2TQ16RCo4wGNfVUONEQ-EBYR1qIfP7r04E5hVgdU7d36btCqE7Y1Yw9i57yd3P-6Ni7XUyu9x3_H2lDYFaWfgB5vFVC</recordid><startdate>200404</startdate><enddate>200404</enddate><creator>YOON, Eun-Jun</creator><creator>RYU, Eun-Kyung</creator><creator>YOO, Kee-Young</creator><general>Association for Computing Machinery</general><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>200404</creationdate><title>A secure user authentication scheme using hash functions</title><author>YOON, Eun-Jun ; RYU, Eun-Kyung ; YOO, Kee-Young</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c182t-fcb8040d087a60a0d19251515334612fa6361cb32ed265020162111430ce31bf3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Cryptography</topic><topic>Exact sciences and technology</topic><topic>Information, signal and communications theory</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Signal and communications theory</topic><topic>Software</topic><topic>Telecommunications and information theory</topic><toplevel>online_resources</toplevel><creatorcontrib>YOON, Eun-Jun</creatorcontrib><creatorcontrib>RYU, Eun-Kyung</creatorcontrib><creatorcontrib>YOO, Kee-Young</creatorcontrib><collection>Pascal-Francis</collection><collection>CrossRef</collection><jtitle>Operating systems review</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>YOON, Eun-Jun</au><au>RYU, Eun-Kyung</au><au>YOO, Kee-Young</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A secure user authentication scheme using hash functions</atitle><jtitle>Operating systems review</jtitle><date>2004-04</date><risdate>2004</risdate><volume>38</volume><issue>2</issue><spage>62</spage><epage>68</epage><pages>62-68</pages><issn>0163-5980</issn><eissn>1943-586X</eissn><coden>OSRED8</coden><abstract>Recently, Lee et al. proposed an improvement on Peyravian and Zunic scheme to make the protocol withstand the guessing attack. However, their scheme suffers from a denial of service attack. In this paper, we show that an attacker can easily prevent the normal use of communication facilities by performing the attack. We also propose an enhancement of the scheme to isolate such a problem.</abstract><cop>New York, NY</cop><pub>Association for Computing Machinery</pub><doi>10.1145/991130.991135</doi><tpages>7</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0163-5980
ispartof Operating systems review, 2004-04, Vol.38 (2), p.62-68
issn 0163-5980
1943-586X
language eng
recordid cdi_crossref_primary_10_1145_991130_991135
source ACM Digital Library
subjects Applied sciences
Computer science
control theory
systems
Cryptography
Exact sciences and technology
Information, signal and communications theory
Memory and file management (including protection and security)
Memory organisation. Data processing
Signal and communications theory
Software
Telecommunications and information theory
title A secure user authentication scheme using hash functions
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T14%3A31%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20secure%20user%20authentication%20scheme%20using%20hash%20functions&rft.jtitle=Operating%20systems%20review&rft.au=YOON,%20Eun-Jun&rft.date=2004-04&rft.volume=38&rft.issue=2&rft.spage=62&rft.epage=68&rft.pages=62-68&rft.issn=0163-5980&rft.eissn=1943-586X&rft.coden=OSRED8&rft_id=info:doi/10.1145/991130.991135&rft_dat=%3Cpascalfrancis_cross%3E15630678%3C/pascalfrancis_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true