Cryptanalysis and the improvement of Kim et al.'s password authentication schemes

被引:0
|
作者
Giri, Debasis [1 ]
Srivastava, P. D. [1 ]
机构
[1] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
来源
关键词
authentication; smart card; attack; timestamp; nonce;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 1999, Yang and Shieh proposed two authentication schemes with smart cards, one is timestamp-based password authentication scheme and other is nonce-based password authentication scheme. In 2002, Chan and Cheng pointed out that Yang and Shieh's timestamp-based password authentication scheme is insecure to vulnerable forgery attack. Further, in 2003, Sun and Yeh showed that Yang and Shieh's both schemes are insecure to vulnerable forgery attack. In 2005, Yang et a]. proposed the improvement of Yang and Shieh's password authentication schemes to withstand Sun and Yeh's forgery attack. In 2005, Kim et al. pointed out the security weaknesses to forgery attacks on Yang et al.'s schemes and they further proposed the improvement of Yang et al.'s schemes in order to resist their attacks. In this paper, we show that the Kim et al.'s password authentication schemes have security weaknesses to forgery attacks. Further, we propose the improvement of Kim et al.'s schemes in order to eliminate these weaknesses.
引用
收藏
页码:156 / 166
页数:11
相关论文
共 50 条
  • [41] Cryptanalysis of timestamp-based password authentication schemes using smart cards
    Wang, Guilin
    Bao, Feng
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 399 - +
  • [42] Cryptanalysis on one-time password authentication schemes using counter value
    Tsuji, T
    Shimizu, A
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (06) : 1756 - 1759
  • [43] Cryptanalysis of two password-based authentication schemes using smart cards
    Phan, RCW
    COMPUTERS & SECURITY, 2006, 25 (01) : 52 - 54
  • [44] Cryptanalysis and Improvement on Lee-Chen's One-Time Password Authentication Scheme
    Lin, Chun-Li
    Hung, Ching-Po
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2008, 2 (02): : 1 - 8
  • [45] Cryptanalysis on Cheng et al. Protocol
    Thakur, Tejeshwari
    INNOVATIONS THROUGH MATHEMATICAL AND STATISTICAL RESEARCH: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES AND STATISTICS (ICMSS2016), 2016, 1739
  • [46] An Authenticated Key Exchange to Improve the Security of Shi et al. and Kim et al.'s Protocols
    Kim, Mijin
    Kwon, Changyoung
    Won, Dongho
    WEB INFORMATION SYSTEMS AND MINING, PT I, 2011, 6987 : 259 - +
  • [47] Attacks on the shen et al.'s timestamp-based password authentication scheme using smart cards
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (01) : 319 - 321
  • [48] Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card
    Kumari, Saru
    Gupta, Mridul K.
    Kumar, Manoj
    OPEN COMPUTER SCIENCE, 2012, 2 (01): : 60 - 75
  • [49] Cryptanalysis of Yeh et al.'s Security-Enhanced Remote User Authentication Scheme with Smart Cards
    Shieh, Wen-Gong
    Horng, Wen-Bing
    JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2013, 16 (03): : 319 - 328
  • [50] Cryptanalysis of Arshad et al.'s ECC-based mutual authentication scheme for session initiation protocol
    Tang, Hongbin
    Liu, Xinsong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 65 (03) : 321 - 333