An improvement of the Yang-Shieh password authentication schemes

被引:22
|
作者
Yang, CC
Wang, RC
Chang, TY
机构
[1] Chaoyang Univ Technol, Dept Comp Sci & Informat & Commun Engn, Wufeng 413, Taichung County, Taiwan
[2] Chaoyang Univ Technol, Dept Informat Management, Wufeng 413, Taichung County, Taiwan
[3] Natl Chiao Tung Univ, Dept Comp & Informat Sci, Hsinchu 413, Taiwan
关键词
authentication; forgery attack; password; smart card;
D O I
10.1016/j.amc.2004.03.017
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Recently, Yang and Shieh proposed two password authentication schemes by employing smart cards. One is a timestamp-based password authentication scheme and the other is a nonce-based password authentication scheme. In 2002, Chan and Cheng pointed Out that Yang and Shieh's timestamp-based password authentication scheme was vulnerable to the forgery attack. However, in 2003, Sun and Yell pointed Out that Chan and Cheng's attack was unreasonable. At the same time, Sun and Yell pointed out that Yang and Shieh's password authentication schemes were still Vulnerable to the forgery attack. In this paper, we shall improve Yang and Shieh's schemes to resist Sun and Yell's attack. (C) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:1391 / 1396
页数:6
相关论文
共 50 条
  • [31] Attack and Improvement of the Secure Password Authentication Protocol in Wireless Networks
    Lee, Yung-Cheng
    OPTICAL, ELECTRONIC MATERIALS AND APPLICATIONS, PTS 1-2, 2011, 216 : 506 - 509
  • [32] Attacks on Shieh-Lin-Yang-Sun digital multisignature schemes for authenticating delegates in mobile code systems
    Yi, X
    Kheong, C
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2002, 51 (06) : 1313 - 1315
  • [33] Cryptanalysis of Yang-Wang-Chang's password authentication scheme with smart cards
    Pathan, Al-Sakib Khan
    Hong, Choong Seon
    10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 1618 - 1620
  • [34] Cryptanalysis of two password-based authentication schemes using smart cards
    Phan, RCW
    COMPUTERS & SECURITY, 2006, 25 (01) : 52 - 54
  • [35] Cryptanalysis of timestamp-based password authentication schemes using smart cards
    Wang, Guilin
    Bao, Feng
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 399 - +
  • [36] Cryptanalysis on one-time password authentication schemes using counter value
    Tsuji, T
    Shimizu, A
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (06) : 1756 - 1759
  • [37] Weakness a Remote Password Authentication Schemes for Multiserver Architecture Using Neural Networks
    Liu, Chenglian
    Lin, Changlu
    Harn, Lien
    Chen, Shisheng
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11B): : 4965 - 4970
  • [38] AN IMPROVEMENT OF REMOTE AUTHENTICATION AND KEY AGREEMENT SCHEMES
    Lee, Cheng-Chi
    Li, Chun-Ta
    Huang, Kuo-You
    Huang, Shiow-Yuan
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2011, 20 (04) : 697 - 707
  • [39] Improvement of smart card based password authentication scheme for multiserver environments
    Tan, Zuowen
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2012, 20 (06) : 881 - 900