Remarks on Wang-Chang's password authentication scheme

被引:3
|
作者
Chan, CK [1 ]
Cheng, LM [1 ]
机构
[1] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Hong Kong, Peoples R China
关键词
Computation theory - Identification (control systems) - Mathematical operators;
D O I
10.1049/el:20010022
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An attack on a remote password authentication scheme proposed by Wang and Chang is presented, It is shown that the scheme is breakable. An intruder can easily construct a valid login request from a previously intercepted one and replay it later to pass the system authentication process.
引用
收藏
页码:22 / 23
页数:2
相关论文
共 50 条
  • [1] Cryptanalysis of Yang-Wang-Chang's password authentication scheme with smart cards
    Pathan, Al-Sakib Khan
    Hong, Choong Seon
    10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 1618 - 1620
  • [2] Cryptanalysis and Improvement of Zhuang-Chang-Wang-Zhu Password Authentication Scheme
    Chen, Shih-Ming
    Pan, Chiu-Shu
    Hwang, Min-Shiang
    INDUSTRIAL ENGINEERING, MACHINE DESIGN AND AUTOMATION (IEMDA 2014) & COMPUTER SCIENCE AND APPLICATION (CCSA 2014), 2015, : 118 - 123
  • [3] Weaknesses and improvements of Yang-Chang-Hwang's password authentication scheme
    Ku, WC
    Tsai, HC
    INFORMATICA, 2005, 16 (02) : 203 - 212
  • [4] A password authentication scheme with secure password updating
    Lin, CL
    Hwang, T
    COMPUTERS & SECURITY, 2003, 22 (01) : 68 - 72
  • [5] Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments
    Chung, Hao-Rung
    Ku, Wei-Chi
    Tsaur, Maw-Jinn
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) : 863 - 868
  • [6] Cryptanalysis of a remote password authentication scheme
    Chan, CK
    Cheng, LM
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2001, 78 (03) : 323 - 326
  • [7] Simple remote password authentication scheme
    Shi, Ronghua
    Hu, Xiangling
    Jisuanji Gongcheng/Computer Engineering, 24 (09): : 43 - 44
  • [8] Hardening the Virtual Password Authentication Scheme
    Rahiemy, Mohammad Zakie Faiz
    Sukarno, Parman
    Jadied, Erwid Musthofa
    2018 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2018, : 429 - 434
  • [9] A New Threshold Password Authentication Scheme
    Lee, Yung-Cheng
    SMART MATERIALS AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2011, 143-144 : 915 - 919
  • [10] Cryptanalysis of an Efficient Password Authentication Scheme
    Pan, Chiu-Shu
    Tsai, Cheng-Yi
    Tsaur, Shyh-Chang
    Hwang, Min-Shiang
    2016 3RD INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2016, : 743 - 748