{"title":"Security Analysis of Two Password Authentication Schemes","authors":"Zuowen Tan","doi":"10.1109/ICMB.2009.57","DOIUrl":null,"url":null,"abstract":"Recently, Rhee, Kwon and Lee proposed a practical authentication scheme only based on the common storage device. In the scheme the remote user does not need to use smart cards. It is convenient for the users to use a common storage device such as a universal serial bus memory. The scheme is easy to implement. However, this authentication scheme is vulnerable to impersonation attacks and middle man attacks. An attacker could impersonate legitimate users to login and access the remote server. In addition, we analyze the security of Fan-Chan- Zhang’s scheme. The scheme suffers from replay attacks and impersonation attacks.","PeriodicalId":125570,"journal":{"name":"2009 Eighth International Conference on Mobile Business","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Eighth International Conference on Mobile Business","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMB.2009.57","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Recently, Rhee, Kwon and Lee proposed a practical authentication scheme only based on the common storage device. In the scheme the remote user does not need to use smart cards. It is convenient for the users to use a common storage device such as a universal serial bus memory. The scheme is easy to implement. However, this authentication scheme is vulnerable to impersonation attacks and middle man attacks. An attacker could impersonate legitimate users to login and access the remote server. In addition, we analyze the security of Fan-Chan- Zhang’s scheme. The scheme suffers from replay attacks and impersonation attacks.