Remarks on Wang-Chang's password authentication scheme

被引:3
|
作者
Chan, CK [1 ]
Cheng, LM [1 ]
机构
[1] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Hong Kong, Peoples R China
关键词
Computation theory - Identification (control systems) - Mathematical operators;
D O I
10.1049/el:20010022
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An attack on a remote password authentication scheme proposed by Wang and Chang is presented, It is shown that the scheme is breakable. An intruder can easily construct a valid login request from a previously intercepted one and replay it later to pass the system authentication process.
引用
收藏
页码:22 / 23
页数:2
相关论文
共 50 条
  • [41] Cryptanalysis and Enhancement of a Password-Based Authentication Scheme
    Eldefrawy, Mohamed H.
    Al-Muhtadi, Jalal F.
    2015 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2015, : 548 - 551
  • [42] Secure agreement scheme for gxy via password authentication
    Kwon, T
    Song, J
    ELECTRONICS LETTERS, 1999, 35 (11) : 892 - 893
  • [43] Further cryptanalysis of a password authentication scheme with smart cards
    Sun, HM
    Yeh, HT
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2003, E86B (04) : 1412 - 1415
  • [44] Cryptanalysis of a password authentication scheme over insecure networks
    Xiang, Tao
    Wong, Kwok-Wo
    Liao, Xiaofeng
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2008, 74 (05) : 657 - 661
  • [45] A Hybrid Password Authentication Scheme Based on Shape and Text
    Zheng, Ziran
    Liu, Xiyu
    Yin, Lizi
    Liu, Zhaocheng
    JOURNAL OF COMPUTERS, 2010, 5 (05) : 765 - 772
  • [46] An enhancement of timestamp-based password authentication scheme
    Fan, L
    Li, JH
    Zhu, HW
    COMPUTERS & SECURITY, 2002, 21 (07) : 665 - 667
  • [47] Hash Chain based Strong Password Authentication Scheme
    Jan, Muhammad Shahzad
    Afzal, Mehreen
    2016 13TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2016, : 355 - 360
  • [48] A password based authentication scheme for wireless multimedia systems
    Nishant Doshi
    Saru Kumari
    Dheerendra Mishra
    Xiong Li
    Kim-Kwang Raymond Choo
    Arun Kumar Sangaiah
    Multimedia Tools and Applications, 2017, 76 : 25893 - 25918
  • [49] A REMOTE PASSWORD AUTHENTICATION SCHEME BASED UPON ELGAMALS SIGNATURE SCHEME
    CHANG, CC
    LIAO, WY
    COMPUTERS & SECURITY, 1994, 13 (02) : 137 - 144
  • [50] Intrusion Prevention by Native Language Password Authentication Scheme
    Malempati, Sreelatha
    Mogalla, Shashi
    ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 239 - +