The study of remote user authentication protocol

碩士 === 淡江大學 === 資訊工程學系碩士班 === 93 === In 2002, Lee, Li and Hwang proposed the remote user authentication protocol but their scheme is not secure. It suffered password guessing attack, stolen-verifier attack, denial of service attack and server spoofing. Therefore, we propose the improved scheme based...

Full description

Bibliographic Details
Main Authors: Jui-Chu Peng, 彭瑞珠
Other Authors: Ren-Junn Hwang
Format: Others
Language:zh-TW
Published: 2005
Online Access:http://ndltd.ncl.edu.tw/handle/37897439515531924479
Description
Summary:碩士 === 淡江大學 === 資訊工程學系碩士班 === 93 === In 2002, Lee, Li and Hwang proposed the remote user authentication protocol but their scheme is not secure. It suffered password guessing attack, stolen-verifier attack, denial of service attack and server spoofing. Therefore, we propose the improved scheme based on Lee-Li-Hwang scheme. According to the concepts of BAN logic, we provide the proof of session key authentication.