Two simple attacks on Lin-Shen-Hwang's strong-password authentication protocol
2003; Association for Computing Machinery; Volume: 37; Issue: 4 Linguagem: Inglês
10.1145/958965.958968
ISSN1943-586X
AutoresWei‐Chi Ku, Hao-Chuan Tsai, Shuai-Min Chen,
Tópico(s)Biometric Identification and Security
ResumoIn 2001, Lin, Sun, and Hwang proposed a strong-password authentication protocol, OSPA, which was later found to be vulnerable to a stolen-verifier attack and a man-in-the-middle attack. Recently, Lin, Shen, and Hwang [10] proposed an improved protocol of OSPA and showed that the improved protocol can resist the guessing attack, the replay attack, the impersonation attack, and the stolen-verifier attack. Herein, we show that their protocol is still vulnerable to a replay attack and a denial-of-service attack.
Referência(s)