An improvement of the Yang-Shieh password authentication schemes

被引:22
|
作者
Yang, CC
Wang, RC
Chang, TY
机构
[1] Chaoyang Univ Technol, Dept Comp Sci & Informat & Commun Engn, Wufeng 413, Taichung County, Taiwan
[2] Chaoyang Univ Technol, Dept Informat Management, Wufeng 413, Taichung County, Taiwan
[3] Natl Chiao Tung Univ, Dept Comp & Informat Sci, Hsinchu 413, Taiwan
关键词
authentication; forgery attack; password; smart card;
D O I
10.1016/j.amc.2004.03.017
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Recently, Yang and Shieh proposed two password authentication schemes by employing smart cards. One is a timestamp-based password authentication scheme and the other is a nonce-based password authentication scheme. In 2002, Chan and Cheng pointed Out that Yang and Shieh's timestamp-based password authentication scheme was vulnerable to the forgery attack. However, in 2003, Sun and Yell pointed Out that Chan and Cheng's attack was unreasonable. At the same time, Sun and Yell pointed out that Yang and Shieh's password authentication schemes were still Vulnerable to the forgery attack. In this paper, we shall improve Yang and Shieh's schemes to resist Sun and Yell's attack. (C) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:1391 / 1396
页数:6
相关论文
共 50 条
  • [21] Analysis of Kim-Jeon-Yoo Password Authentication Schemes
    Liu, Jiqiang
    Zhong, Sheng
    CRYPTOLOGIA, 2009, 33 (02) : 183 - 187
  • [22] Weaknesses of two SAS-like password authentication schemes
    Chiang, MH
    Ku, WC
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2006, E89B (02) : 594 - 597
  • [23] Improvement on a Smart Card Based Password Authentication Scheme
    He, Debiao
    Chen, Jianhua
    Hu, Jin
    JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (03): : 405 - 409
  • [24] An improvement on a password authentication scheme over insecure networks
    Zeng, Yong
    Ma, Jianfeng
    Journal of Computational Information Systems, 2009, 5 (04): : 1331 - 1336
  • [25] Weaknesses and improvements of Yang-Chang-Hwang's password authentication scheme
    Ku, WC
    Tsai, HC
    INFORMATICA, 2005, 16 (02) : 203 - 212
  • [26] Cryptanalysis of Kim et al's two password authentication schemes
    Li, Jiping
    Xiong, Zenggang
    Ding, Yaoming
    Liu, Shouyin
    Information Technology Journal, 2013, 12 (18) : 4513 - 4516
  • [27] Cryptanalysis and security enhancement of two password authentication schemes with smart cards
    Khan, Muhammad Khurram
    INMIC 2007: PROCEEDINGS OF THE 11TH IEEE INTERNATIONAL MULTITOPIC CONFERENCE, 2007, : 74 - 77
  • [28] Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards
    Wang, Ding
    Wang, Ping
    INFORMATION SECURITY (ISC 2013), 2015, 7807 : 221 - 237
  • [29] Efficient and secure password authentication schemes for low-power devices
    Kim, KW
    Jeon, JC
    Yoo, KY
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2005, 3794 : 73 - 82
  • [30] Security improvement on a timestamp-based password authentication scheme
    Wang, YJ
    Li, JH
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 580 - 582