Remarks on Wang-Chang's password authentication scheme

被引:3
|
作者
Chan, CK [1 ]
Cheng, LM [1 ]
机构
[1] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Hong Kong, Peoples R China
关键词
Computation theory - Identification (control systems) - Mathematical operators;
D O I
10.1049/el:20010022
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An attack on a remote password authentication scheme proposed by Wang and Chang is presented, It is shown that the scheme is breakable. An intruder can easily construct a valid login request from a previously intercepted one and replay it later to pass the system authentication process.
引用
收藏
页码:22 / 23
页数:2
相关论文
共 50 条
  • [21] A PASSWORD AUTHENTICATION SCHEME BASED ON DISCRETE LOGARITHMS
    WU, TC
    CHANG, CC
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1991, 41 (1-2) : 31 - 38
  • [22] An Improved Password Authentication Scheme for Smart Card
    Tsai, Cheng-Yi
    Pan, Chiu-Shu
    Hwang, Min-Shiang
    RECENT DEVELOPMENTS IN INTELLIGENT SYSTEMS AND INTERACTIVE APPLICATIONS (IISA2016), 2017, 541 : 194 - 199
  • [23] Password authentication scheme preserving identity privacy
    Yang, Fuw-Yi
    Hsu, Chih-Wei
    Chiu, Su-Hui
    2014 SIXTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2014, : 443 - 447
  • [24] Timestamp-based Password Authentication Scheme
    Ismail, E. S.
    Syed-Musa, S. M. S.
    PROCEEDING OF THE 25TH NATIONAL SYMPOSIUM ON MATHEMATICAL SCIENCES (SKSM25): MATHEMATICAL SCIENCES AS THE CORE OF INTELLECTUAL EXCELLENCE, 2018, 1974
  • [25] A Tabular Steganography Scheme for Graphical Password Authentication
    Lin, Tsung-Hung
    Lee, Cheng-Chi
    Tsai, Chwei-Shyong
    Guo, Shin-Dong
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2010, 7 (04) : 823 - 841
  • [26] Improvement Upon Mutual Password Authentication Scheme
    Zhu, Lu
    Yu, Sheng
    Zhang, Xing
    ISBIM: 2008 INTERNATIONAL SEMINAR ON BUSINESS AND INFORMATION MANAGEMENT, VOL 1, 2009, : 400 - +
  • [27] An Efficient Remote User Password Authentication Scheme based on Rabin's Cryptosystem
    Ranjan, Pratik
    Om, Hari
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (01) : 217 - 244
  • [28] An Efficient Remote User Password Authentication Scheme based on Rabin’s Cryptosystem
    Pratik Ranjan
    Hari Om
    Wireless Personal Communications, 2016, 90 : 217 - 244
  • [29] One-time password password authentication scheme based on the negative database
    Zhao, Dongdong
    Luo, Wenjian
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2017, 62 : 396 - 404
  • [30] An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards
    Chang, Chin-Chen
    Tsai, Hao-Chuan
    Chen, Yi-Hui
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2007, 1 (02): : 33 - 40