Cryptanalysis and the improvement of Kim et al.'s password authentication schemes

被引:0
|
作者
Giri, Debasis [1 ]
Srivastava, P. D. [1 ]
机构
[1] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
来源
关键词
authentication; smart card; attack; timestamp; nonce;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 1999, Yang and Shieh proposed two authentication schemes with smart cards, one is timestamp-based password authentication scheme and other is nonce-based password authentication scheme. In 2002, Chan and Cheng pointed out that Yang and Shieh's timestamp-based password authentication scheme is insecure to vulnerable forgery attack. Further, in 2003, Sun and Yeh showed that Yang and Shieh's both schemes are insecure to vulnerable forgery attack. In 2005, Yang et a]. proposed the improvement of Yang and Shieh's password authentication schemes to withstand Sun and Yeh's forgery attack. In 2005, Kim et al. pointed out the security weaknesses to forgery attacks on Yang et al.'s schemes and they further proposed the improvement of Yang et al.'s schemes in order to resist their attacks. In this paper, we show that the Kim et al.'s password authentication schemes have security weaknesses to forgery attacks. Further, we propose the improvement of Kim et al.'s schemes in order to eliminate these weaknesses.
引用
收藏
页码:156 / 166
页数:11
相关论文
共 50 条
  • [1] Cryptanalysis of Kim et al's two password authentication schemes
    Li, Jiping
    Xiong, Zenggang
    Ding, Yaoming
    Liu, Shouyin
    Information Technology Journal, 2013, 12 (18) : 4513 - 4516
  • [2] An improvement on Yang et al.'s password authentication schemes
    Kim, KW
    Jeon, JC
    Yoo, KY
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (01) : 207 - 215
  • [3] Cryptanalysis and improvement of barman et al.’s secure remote user authentication scheme
    Patel, Chintan
    Doshi, Nishant
    International Journal of Circuits, Systems and Signal Processing, 2019, 13 : 604 - 610
  • [4] Drawbacks of Liao et al.'s password authentication scheme
    Yoon, Eun-Jun
    Yoo, Kee-Young
    INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, PROCEEDINGS, 2006, : 101 - +
  • [5] The Weakness of Moon et al.'s Password Authentication Scheme
    Irawan, Bam-bang
    Hwang, Min-shiang
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [6] Cryptanalysis of Farash et al.'s SIP authentication protocol
    Azrour, Mourade
    Farhaoui, Yousef
    Ouanan, Mohammed
    INTERNATIONAL JOURNAL OF DYNAMICAL SYSTEMS AND DIFFERENTIAL EQUATIONS, 2018, 8 (1-2) : 77 - 94
  • [7] Cryptanalysis of Kim Jiye et al.’s two-factor mutual authentication with key agreement in WSNs
    Li J.
    Ding Y.
    Xiong Z.
    Liu S.
    Li H.
    Ding, Yaoming (xgdym2015@aliyun.com), 1600, Engineering and Technology Publishing (11) : 58 - 63
  • [8] Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme
    Ma, Chun-Guang
    Wang, Ding
    Zhang, Qi-Ming
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2012, 7154 : 141 - 152
  • [9] Cryptanalysis of Tseng et al.'s authenticated encryption schemes
    Qi, X
    Xiu, YY
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 158 (01) : 1 - 5
  • [10] Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.
    Irshad, Azeem
    Sher, Muhammad
    Alzahrani, Bander A.
    Albeshri, Aiiad
    Chaudhry, Shehzad Ashraf
    Kumari, Saru
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (01): : 523 - 549