An improvement of the Yang-Shieh password authentication schemes

被引:22
|
作者
Yang, CC
Wang, RC
Chang, TY
机构
[1] Chaoyang Univ Technol, Dept Comp Sci & Informat & Commun Engn, Wufeng 413, Taichung County, Taiwan
[2] Chaoyang Univ Technol, Dept Informat Management, Wufeng 413, Taichung County, Taiwan
[3] Natl Chiao Tung Univ, Dept Comp & Informat Sci, Hsinchu 413, Taiwan
关键词
authentication; forgery attack; password; smart card;
D O I
10.1016/j.amc.2004.03.017
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Recently, Yang and Shieh proposed two password authentication schemes by employing smart cards. One is a timestamp-based password authentication scheme and the other is a nonce-based password authentication scheme. In 2002, Chan and Cheng pointed Out that Yang and Shieh's timestamp-based password authentication scheme was vulnerable to the forgery attack. However, in 2003, Sun and Yell pointed Out that Chan and Cheng's attack was unreasonable. At the same time, Sun and Yell pointed out that Yang and Shieh's password authentication schemes were still Vulnerable to the forgery attack. In this paper, we shall improve Yang and Shieh's schemes to resist Sun and Yell's attack. (C) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:1391 / 1396
页数:6
相关论文
共 50 条
  • [1] Security improvement on Yang-Shieh's authentication scheme
    Wang, YJ
    Li, JH
    Tie, L
    2004 INTERNATIONAL CONFERENCE ON COMMUNICATION, CIRCUITS, AND SYSTEMS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS - VOL 2: SIGNAL PROCESSING, CIRCUITS AND SYSTEMS, 2004, : 4 - 5
  • [2] Attacks on the (enhanced) Yang-Shieh authentication
    Chen, KF
    Zhong, S
    COMPUTERS & SECURITY, 2003, 22 (08) : 725 - 727
  • [3] Attacks on the (enhanced) Yang-Shieh authentication (vol 22, pg 725, 2003)
    McKenna, B
    COMPUTERS & SECURITY, 2004, 23 (01) : 85 - 85
  • [4] An improvement on Yang et al.'s password authentication schemes
    Kim, KW
    Jeon, JC
    Yoo, KY
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (01) : 207 - 215
  • [5] Improvement on Peyravian-Zunic's password authentication schemes
    Hwang, JJ
    Yeh, TC
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2002, E85B (04) : 823 - 825
  • [6] Analysis and Improvement of Two Password Authentication Schemes Using Smart Cards
    Xu, Jing
    Zhu, Wen-Tao
    Feng, Deng-Guo
    SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 117 - 120
  • [7] 基于Diff-Hellman的改进Yang-Shieh智能卡认证协议
    杨照芳
    程小平
    西南师范大学学报(自然科学版), 2006, (06) : 110 - 113
  • [8] Password authentication schemes with smart cards
    Yang, WH
    Shieh, SP
    COMPUTERS & SECURITY, 1999, 18 (08) : 727 - 733
  • [9] Password authentication schemes on a quantum computer
    Wang, Sherry
    Adams, Carlisle
    Broadbent, Anne
    2021 IEEE INTERNATIONAL CONFERENCE ON QUANTUM COMPUTING AND ENGINEERING (QCE 2021) / QUANTUM WEEK 2021, 2021, : 346 - 350
  • [10] Cryptanalysis and the improvement of Kim et al.'s password authentication schemes
    Giri, Debasis
    Srivastava, P. D.
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2007, 4812 : 156 - 166