@article{ART001744725},
author={박미옥},
title={Weaknesses Cryptanalysis of Khan's Scheme and Improved Authentication Scheme preserving User Anonymity},
journal={Journal of The Korea Society of Computer and Information},
issn={1598-849X},
year={2013},
volume={18},
number={2},
pages={87-94}
TY - JOUR
AU - 박미옥
TI - Weaknesses Cryptanalysis of Khan's Scheme and Improved Authentication Scheme preserving User Anonymity
JO - Journal of The Korea Society of Computer and Information
PY - 2013
VL - 18
IS - 2
PB - The Korean Society Of Computer And Information
SP - 87
EP - 94
SN - 1598-849X
AB - In this paper, we analyse the weaknesses of authentication scheme preserving user anonymity proposed by Khan et al in 2011 and we propose a new authentication schemes preserving user anonymity that improved these weaknesses. Khan et al's authentication scheme is vulnerable to insider attack and doesn't provide user anonymity to the server. Also, this scheme is still a weakness of wrong password input by mistake in spite of proposing the password change phase. In this paper,we will show that Khan et al's scheme is vulnerable to the stolen smart card attack and the strong server/user masquerade attack. The proposed authentication scheme propose the improved user anonymity, which can provide more secure privacy to user by improving these weaknesses.
KW - User Anonymity;Smart Card;Insider Attack;Strong Masquerade attack;User Privacy
DO -
UR -
ER -
박미옥. (2013). Weaknesses Cryptanalysis of Khan's Scheme and Improved Authentication Scheme preserving User Anonymity. Journal of The Korea Society of Computer and Information, 18(2), 87-94.
박미옥. 2013, "Weaknesses Cryptanalysis of Khan's Scheme and Improved Authentication Scheme preserving User Anonymity", Journal of The Korea Society of Computer and Information, vol.18, no.2 pp.87-94.
박미옥 "Weaknesses Cryptanalysis of Khan's Scheme and Improved Authentication Scheme preserving User Anonymity" Journal of The Korea Society of Computer and Information 18.2 pp.87-94 (2013) : 87.
박미옥. Weaknesses Cryptanalysis of Khan's Scheme and Improved Authentication Scheme preserving User Anonymity. 2013; 18(2), 87-94.
박미옥. "Weaknesses Cryptanalysis of Khan's Scheme and Improved Authentication Scheme preserving User Anonymity" Journal of The Korea Society of Computer and Information 18, no.2 (2013) : 87-94.
박미옥. Weaknesses Cryptanalysis of Khan's Scheme and Improved Authentication Scheme preserving User Anonymity. Journal of The Korea Society of Computer and Information, 18(2), 87-94.
박미옥. Weaknesses Cryptanalysis of Khan's Scheme and Improved Authentication Scheme preserving User Anonymity. Journal of The Korea Society of Computer and Information. 2013; 18(2) 87-94.
박미옥. Weaknesses Cryptanalysis of Khan's Scheme and Improved Authentication Scheme preserving User Anonymity. 2013; 18(2), 87-94.
박미옥. "Weaknesses Cryptanalysis of Khan's Scheme and Improved Authentication Scheme preserving User Anonymity" Journal of The Korea Society of Computer and Information 18, no.2 (2013) : 87-94.