2011 14th IEEE International Conference on Computational Science and Engineering 2011
DOI: 10.1109/cse.2011.79
|View full text |Cite
|
Sign up to set email alerts
|

On the Security of Digest Access Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
2
2
1

Relationship

4
1

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Second, with the efficient password cracking using probabilistic context‐free grammars, we further improve it to quickly crack the known‐length password. We confirm that it is unsuitable to further deploy PPPoE in commercial using until all of the proven weak authentication protocols are abolished and replaced with more secure Extensible Authentication Protocols (EAPs), and the security of MD5‐based network applications should be re‐evaluated .…”
Section: Introductionmentioning
confidence: 84%
“…Second, with the efficient password cracking using probabilistic context‐free grammars, we further improve it to quickly crack the known‐length password. We confirm that it is unsuitable to further deploy PPPoE in commercial using until all of the proven weak authentication protocols are abolished and replaced with more secure Extensible Authentication Protocols (EAPs), and the security of MD5‐based network applications should be re‐evaluated .…”
Section: Introductionmentioning
confidence: 84%
“…Authentication Post Office Protocol (APOP) [1], [6], [7] is a popular challenge-and-response authentication protocol, which used by a POP3 mail server to authenticate the peer who tries to access his e-mails stored on the server. The server sends a challenge C with some restrictions to the peer.…”
Section: Preliminariesmentioning
confidence: 99%
“…MD5 [11,17,7,8] is a typical Merkle-Damgård structure hash function, which takes a variable-length message M as input and outputs a 128-bit hash value. M is first padded to be multiples of 512 bits, a '1' added at the tail of M , followed by '0's until the bit length becomes 448 on modulo 512, finally, the length of the unpadded message M is inserted to the last 64 bits.…”
Section: Brief Description Of Md5mentioning
confidence: 99%