Weaknesses and drawbacks of a password authentication scheme using neural networks for multiserver architecture

@article{Ku2005WeaknessesAD,
  title={Weaknesses and drawbacks of a password authentication scheme using neural networks for multiserver architecture},
  author={Wei-Chi Ku},
  journal={IEEE Transactions on Neural Networks},
  year={2005},
  volume={16},
  pages={1002-1005}
}
In 2001, Li et al. proposed a password authentication scheme for the multiserver architecture by using a pattern classification system based on neural networks. Herein, we demonstrate that Li et al.'s scheme is vulnerable to an offline password guessing attack and a privileged insider's attack, and is not reparable. Additionally, we show that Li et al.'s scheme has several drawbacks in practice. 
Highly Cited
This paper has 37 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 20 extracted citations

Further Improved Remote User Authentication Scheme

IEICE Transactions • 2011
View 4 Excerpts
Highly Influenced

A Group Authentication Scheme Based on Lagrange Interpolation Polynomial

2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) • 2016
View 1 Excerpt

An efficient group authentication mechanism supporting key confidentiality, key freshness and key authentication in cloud computing

2015 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC) • 2015

Diffie-Hellman Based Smart-Card Multi-server Authentication Scheme

2014 International Conference on Computational Intelligence and Communication Networks • 2014
View 1 Excerpt

Efficient message security based Hyper Elliptic Curve Cryptosystem (HECC) for Mobile Instant Messenger

2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering • 2014
View 1 Excerpt

Grid system security without public key settings

2014 International Conference on Computer and Communication Technology (ICCCT) • 2014
View 2 Excerpts

Model of secure P2P mobile instant messaging based on virtual network

2014 International Conference on Information Technology Systems and Innovation (ICITSI) • 2014
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 17 references

An efficient remote use authentication scheme using smart cards

IEEE Trans. Consumer Electronics • 2000
View 3 Excerpts
Highly Influenced

Protecting Poorly Chosen Secrets from Guessing Attacks

IEEE Journal on Selected Areas in Communications • 1993
View 3 Excerpts
Highly Influenced

Security of a remote user authentication scheme using smart cards

H. T. Yeh, H. M. Sun, B. T. Hsieh
IEICE Trans. Commun., vol. E87-B, no. 1, pp. 192–194, Jan. 2004. • 2004
View 1 Excerpt

Further cryptanalysis of a password authentication scheme with smart cards

H. M. Sun, H. T. Yeh
IEICE Trans. Commun., vol. E86-B, no. 4, pp. 1412–1415, Apr. 2003. • 2003
View 1 Excerpt

Similar Papers

Loading similar papers…