Cryptanalysis of Tso et al.'s Password Authentication Scheme Based on Smart Card

In 2015, Tso et al.'s demonstrated that the researchers password authentication scheme could not achieve the user anonymity property and do not allow changing password freely for the user. Then, they proposed a new method to remedy the weaknesses. However, this paper points out that Tso et al.'s scheme is still vulnerable to online password guessing attack and denial of service attack using stolen smart card unlike their claims. For this reason, Tso et al.'s scheme is insecure for practical application.

Spotlight

Blackbourne Worldwide

Blackbourne Worldwide is a woman owned cybersecurity services using the most elite and sophisticated attack vectors, methodologies, and processes that black-hat hackers use in order to infiltrate and maintain access in an organization. Our proprietary Social Engineering platform allows us focus on the weakest element of any system: the human. With our expert security research staff, our attacks are custom to your business, applications, and software. Our services are as real world as you can get.

OTHER WHITEPAPERS
news image

Project Blackfin: Automated Breach Detection Using Intelligent Agents

whitePaper | December 4, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes communication and replication of learned states between these models.

Read More
news image

Password Safe Cloud 22.2 Security Whitepaper

whitePaper | August 5, 2022

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to their organization. BeyondTrust can help your support organization stay secure and compliant, while improving the efficiency and success of your organization with a better end-user support experience.

Read More
news image

Cloud-native security practicesin IBM Cloud

whitePaper | December 15, 2019

IBM Cloud™ is IBM’s high-performing public cloud platform, with data centers around the world that deliver cloud computing options from infrastructure as a service (IaaS), platform as a service (PaaS) to software as a service (SaaS). Security is a fundamental design principle for our cloud platform with market-leading security capabilities enabled for regulatory workloads.

Read More
news image

Supercharge Your DLP Security Program

whitePaper | December 22, 2022

Today’s digitally transformed organizations handle vast volumes of data that is at perpetual risk for loss and leakage, either intentionally through data breaches or unintentionally through employee errors. With cybercrime damages expected to reach $10.5 trillion annually by 2025, 1 organizations must protect their threat surface holistically.

Read More
news image

Cloud Privilege Broker 22.1 Security Whitepaper

whitePaper | September 15, 2022

There is complete end-to-end encryption from BeyondInsight with Cloud Privilege Broker through to the Cloud Platform Infrastructure. Cloud Privilege Broker services communicate with each other through distributed queues over TLS encryption.

Read More
news image

Cyber Risk Appetite: Defining and Understanding Risk in the Modern Enterprise

whitePaper | January 16, 2020

Managing risk is a balancing act for organizations of all sizes and disciplines. While some organizations take on too much risk, others arguably do not take on enough. Complicating this equation is the emergence of cyber as one of the most impactful sources of risk in the modern enterprise. In fact, cyber security is now increasingly reviewed by corporate boards of directors and often discussed with financial analysts who see cyber security risk as an imminent and paramount business risk. Because the consequences of cyber security failures can be damaging to business revenues and brand reputation, CEOs have lost their positions as a result of data breaches and inept preparation and planning.

Read More

Spotlight

Blackbourne Worldwide

Blackbourne Worldwide is a woman owned cybersecurity services using the most elite and sophisticated attack vectors, methodologies, and processes that black-hat hackers use in order to infiltrate and maintain access in an organization. Our proprietary Social Engineering platform allows us focus on the weakest element of any system: the human. With our expert security research staff, our attacks are custom to your business, applications, and software. Our services are as real world as you can get.

Events