Cryptanalysis and the improvement of Kim et al.'s password authentication schemes

被引:0
|
作者
Giri, Debasis [1 ]
Srivastava, P. D. [1 ]
机构
[1] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
来源
关键词
authentication; smart card; attack; timestamp; nonce;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 1999, Yang and Shieh proposed two authentication schemes with smart cards, one is timestamp-based password authentication scheme and other is nonce-based password authentication scheme. In 2002, Chan and Cheng pointed out that Yang and Shieh's timestamp-based password authentication scheme is insecure to vulnerable forgery attack. Further, in 2003, Sun and Yeh showed that Yang and Shieh's both schemes are insecure to vulnerable forgery attack. In 2005, Yang et a]. proposed the improvement of Yang and Shieh's password authentication schemes to withstand Sun and Yeh's forgery attack. In 2005, Kim et al. pointed out the security weaknesses to forgery attacks on Yang et al.'s schemes and they further proposed the improvement of Yang et al.'s schemes in order to resist their attacks. In this paper, we show that the Kim et al.'s password authentication schemes have security weaknesses to forgery attacks. Further, we propose the improvement of Kim et al.'s schemes in order to eliminate these weaknesses.
引用
收藏
页码:156 / 166
页数:11
相关论文
共 50 条
  • [31] Kim et al. reply
    Kim S.
    Jin J.
    Kim Y.-J.
    Park I.-Y.
    Kim Y.
    Kim S.-W.
    Nature, 2012, 485 (7397) : E1 - E3
  • [32] In Regard to Kim et al.
    Liu, Qian
    Luo, Jingwei
    International Journal of Radiation Oncology Biology Physics, 2024, 118 (01): : 306 - 308
  • [33] Kim et al. Reply
    Kim, Sang Wook
    Kim, Kang-Hwan
    Sagawa, Takahiro
    De Liberato, Simone
    Ueda, Masahito
    Physical Review Letters, 2013, 111 (18)
  • [34] Mean-set attack: cryptanalysis of Sibert et al. authentication protocol
    Mosina, Natalia
    Ushakov, Alexander
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2010, 4 (02) : 149 - 174
  • [35] An improvement on Lee et al.'s nonce-based authentication scheme
    Shieh, Wen-Gong
    Wang, Mei-Tzu
    WSEAS Transactions on Information Science and Applications, 2007, 4 (04): : 832 - 835
  • [36] An Improvement of Liao et al.'s Authentication Scheme using Smart Cards
    Sood, Sandeep K.
    Sarje, Anil K.
    Singh, Kuldip
    2010 IEEE 2ND INTERNATIONAL ADVANCE COMPUTING CONFERENCE, 2010, : 240 - 245
  • [37] An Improvement of Sood, et al. 's Authentication Scheme using Smart Card
    Shin, Kwang Cheul
    Cho, Jung Gil
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 271 - 281
  • [38] An improvement of the Yang-Shieh password authentication schemes
    Yang, CC
    Wang, RC
    Chang, TY
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (03) : 1391 - 1396
  • [39] Cryptanalysis of Vaidya et al.'s User Authentication Scheme with Key Agreement in Wireless Sensor Networks
    Li Jiping
    Ding Yaoming
    Xiong Zenggang
    Liu Shouyin
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 619 - 623