{"title":"高效远程相互认证和密钥协议的两个安全问题","authors":"Eunjun Yoon, K. Yoo","doi":"10.1109/FGCN.2007.225","DOIUrl":null,"url":null,"abstract":"In the ubiquitous environments, smart cards as an ubiquitous computing device provide several services to pervasive computing and ubiquitous services. In 2006, Shieh-Wang pointed out the weakness of Juang's remote mutual authentication scheme using smart card and further proposed a novel remote user authentication scheme using smart card. The current paper, however, demonstrates that Shieh-Wang's scheme does not provide perfect forward secrecy and is vulnerable to a privileged insider's attack.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Two Security Problems of Efficient Remote Mutual Authentication and Key Agreement\",\"authors\":\"Eunjun Yoon, K. Yoo\",\"doi\":\"10.1109/FGCN.2007.225\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the ubiquitous environments, smart cards as an ubiquitous computing device provide several services to pervasive computing and ubiquitous services. In 2006, Shieh-Wang pointed out the weakness of Juang's remote mutual authentication scheme using smart card and further proposed a novel remote user authentication scheme using smart card. The current paper, however, demonstrates that Shieh-Wang's scheme does not provide perfect forward secrecy and is vulnerable to a privileged insider's attack.\",\"PeriodicalId\":254368,\"journal\":{\"name\":\"Future Generation Communication and Networking (FGCN 2007)\",\"volume\":\"84 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-12-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Future Generation Communication and Networking (FGCN 2007)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FGCN.2007.225\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Future Generation Communication and Networking (FGCN 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FGCN.2007.225","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Two Security Problems of Efficient Remote Mutual Authentication and Key Agreement
In the ubiquitous environments, smart cards as an ubiquitous computing device provide several services to pervasive computing and ubiquitous services. In 2006, Shieh-Wang pointed out the weakness of Juang's remote mutual authentication scheme using smart card and further proposed a novel remote user authentication scheme using smart card. The current paper, however, demonstrates that Shieh-Wang's scheme does not provide perfect forward secrecy and is vulnerable to a privileged insider's attack.