Skip Nav Destination
ASME Press Select Proceedings
International Conference on Computer Technology and Development, 3rd (ICCTD 2011)
ISBN:
9780791859919
No. of Pages:
2000
Publisher:
ASME Press
Publication date:
2011
eBook Chapter
126 Security Analysis of Peyravian-Jeffries's Remote User Authentication Protocol
By
Yongning Guo
,
Yongning Guo
Deaprtment of Mathematics and Computer Science.,
Fuqing Branch of Fujian Normal University
, Fuqing, 350300
, China
; guoyn@163.com
Search for other works by this author on:
Chenglian Liu
Chenglian Liu
Deaprtment of Mathematics and Computer Science,
Fuqing Branch of Fujian Normal University
, Fuqing, 350300
, China
; chenglian.liu@gmial.com
Search for other works by this author on:
Page Count:
5
-
Published:2011
Citation
Guo, Y, & Liu, C. "Security Analysis of Peyravian-Jeffries's Remote User Authentication Protocol." International Conference on Computer Technology and Development, 3rd (ICCTD 2011). Ed. Zhou, J. ASME Press, 2011.
Download citation file:
Peyravian and Jeffries proposed a secure remote user access over insecure network in 2006. Shortly after, Munila and Peinada gave an off-line password-guessing attack to Peyravian-Jeffries's remote user authentication protocol. In the same time, Shim also presented a security flaws of remote user access over insecure network based on Peyravian-Jeffries scheme. In 2008, Holbl et al. proposed an improvement of Peyravian-Jeffries's user authentication protocol and password change protocol based on their finding which it immune against the attack. In this paper, we propose a method different from the previous attacks, the method is based on the mutually exclusive or among the fundamental problems in the computer system.
Abstract
Key Words
1. Introduction
2. Review of Peyravian-Jeffries's Protocol
3. Some Attacks and Improvement
4. Our Attack
5. Conclusion
Acknowledgment
References
This content is only available via PDF.
You do not currently have access to this chapter.
Email alerts
Related Chapters
An Attribute Based Partial Blind Signature Scheme with Provable Security
International Conference on Control Engineering and Mechanical Design (CEMD 2017)
Security Analysis for a Lightweight Modified Cryptographic TEA Algorithm
International Conference on Computer and Electrical Engineering 4th (ICCEE 2011)
The Study of Sniffing Techniques and Defensive Strategy in WIFI
International Conference on Information Technology and Computer Science, 3rd (ITCS 2011)
A Wide Survey on IRC Botnet Detection
International Conference on Computer and Electrical Engineering 4th (ICCEE 2011)
Related Articles
The Need for Integrated Cybersecurity and Safety Training
ASME J of Nuclear Rad Sci (October,2018)
Intrusion Detection System for Cyber-Manufacturing System
J. Manuf. Sci. Eng (March,2019)
Analyses of Feedwater Trip With SBO Sequence of VVER1000 Reactor
ASME J of Nuclear Rad Sci (October,2016)