본문 바로가기 주메뉴 바로가기
검색 검색영역닫기 검색 검색영역닫기 ENGLISH 메뉴 전체보기 메뉴 전체보기

논문

Security Analysis of Three Password Authentication Schemes

https://doi.org/10.3217/jucs-017-11-1623

  • 저자Kyung-Ah Shim
  • 학술지Journal of Universal Computer Science 17
  • 등재유형
  • 게재일자(2011)


 In this paper, we show that a verifier-based password authentication scheme and two remote user authentication schemes are insecure against several active attacks. These results demonstrate that no more password authentication schemes should be constructed with such ad-hoc methods, i.e, the formal design methodology using provable security should be employed.


 In this paper, we show that a verifier-based password authentication scheme and two remote user authentication schemes are insecure against several active attacks. These results demonstrate that no more password authentication schemes should be constructed with such ad-hoc methods, i.e, the formal design methodology using provable security should be employed.

이 페이지에서 제공하는 정보에 대해 만족하십니까?