Off-line password-guessing attack to Peyravian-Jeffries's remote user authentication protocol

@article{Munilla2006OfflinePA,
  title={Off-line password-guessing attack to Peyravian-Jeffries's remote user authentication protocol},
  author={Jorge Munilla and Alberto Peinado},
  journal={Computer Communications},
  year={2006},
  volume={30},
  pages={52-54}
}
Recently, Peyravian and Jeffries [M. Peyravian, C. Jeffries, Secure remote user access over insecure networks, Computer Communications 29 (2006) 660–667] have proposed two set of protocols to perform remote user authentication and password change in a secure manner. The first set of protocols is based on hash functions, where no symmetric or asymmetric encryption scheme is applied. As Peyravian and Jeffries claim, these protocols suffer from an off-line password-guessing attack. They propose a… CONTINUE READING
Highly Cited
This paper has 20 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 12 extracted citations

Security analysis of smart card based password authentication schemes

The 3rd International Conference on Information Sciences and Interaction Sciences • 2010
View 4 Excerpts
Highly Influenced

Complementary Scheme of Remote User Access over Insecure Networks

Proceedings of the 4th International Conference on Ubiquitous Information Technologies & Applications • 2009
View 2 Excerpts

References

Publications referenced by this paper.
Showing 1-6 of 6 references

Secure remote user access over insecure networks

Computer Communications • 2006
View 8 Excerpts
Highly Influenced

CompChall: addressing password guessing attacks

International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II • 2004
View 1 Excerpt

Securing passwords against dictionary attacks

ACM Conference on Computer and Communications Security • 2002
View 1 Excerpt

Protecting Poorly Chosen Secrets from Guessing Attacks

IEEE Journal on Selected Areas in Communications • 1993
View 1 Excerpt

New directions in cryptography

IEEE Trans. Information Theory • 1976
View 1 Excerpt

Similar Papers

Loading similar papers…