Cryptanalysis and the improvement of Kim et al.'s password authentication schemes

被引:0
|
作者
Giri, Debasis [1 ]
Srivastava, P. D. [1 ]
机构
[1] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
来源
关键词
authentication; smart card; attack; timestamp; nonce;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 1999, Yang and Shieh proposed two authentication schemes with smart cards, one is timestamp-based password authentication scheme and other is nonce-based password authentication scheme. In 2002, Chan and Cheng pointed out that Yang and Shieh's timestamp-based password authentication scheme is insecure to vulnerable forgery attack. Further, in 2003, Sun and Yeh showed that Yang and Shieh's both schemes are insecure to vulnerable forgery attack. In 2005, Yang et a]. proposed the improvement of Yang and Shieh's password authentication schemes to withstand Sun and Yeh's forgery attack. In 2005, Kim et al. pointed out the security weaknesses to forgery attacks on Yang et al.'s schemes and they further proposed the improvement of Yang et al.'s schemes in order to resist their attacks. In this paper, we show that the Kim et al.'s password authentication schemes have security weaknesses to forgery attacks. Further, we propose the improvement of Kim et al.'s schemes in order to eliminate these weaknesses.
引用
收藏
页码:156 / 166
页数:11
相关论文
共 50 条
  • [21] Cryptanalysis of Yang et al.'s Handover Authentication Scheme For Mobile Network Environment
    Deng, Yong-Yuan
    Chen, Chin-Ling
    Shin, Jungpil
    Wang, Kun-hao
    2017 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROLS (ISCSIC), 2017, : 152 - 157
  • [22] Analysis of Kim-Jeon-Yoo Password Authentication Schemes
    Liu, Jiqiang
    Zhong, Sheng
    CRYPTOLOGIA, 2009, 33 (02) : 183 - 187
  • [23] Cryptanalysis and improvement of Choie et al.'s authenticated key agreement protocols
    Wang, Shengbao
    Cao, Zhenfu
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1371 - 1374
  • [24] Cryptanalysis and improvement of Q. Peng et al.'s PVSS scheme
    Biswas, Anindya Kumar
    Dasgupta, Mou
    Ray, Sangram
    CRYPTOLOGIA, 2024, 48 (04) : 291 - 304
  • [25] Cryptanalysis on improved Chou et al.'s ID-based deniable authentication protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 87 - +
  • [26] Cryptanalysis and security enhancement of two password authentication schemes with smart cards
    Khan, Muhammad Khurram
    INMIC 2007: PROCEEDINGS OF THE 11TH IEEE INTERNATIONAL MULTITOPIC CONFERENCE, 2007, : 74 - 77
  • [27] Cryptanalysis of Wang et al.'s remote user authentication scheme using smart cards
    Yoon, Eun-Jun
    Lee, Eun-Jung
    Yoo, Kee-Young
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 575 - +
  • [28] Improvement on Li et al.'s generalization of proxy signature schemes
    Hwang, SJ
    Chan, CC
    COMPUTERS & SECURITY, 2004, 23 (07) : 615 - 619
  • [29] Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Gopalakrishnan, Ragavendran
    Karuturi, Naga Naresh
    Rangan, C. Pandu
    INFORMATION SECURITY APPLICATIONS, 2009, 5379 : 115 - 129
  • [30] Cryptanalysis of Tan's improvement on a password authentication scheme for multi-server environments
    Feng, Tung-Huang
    Ling, Chung-Huei
    Hwang, Min-Shiang
    International Journal of Network Security, 2014, 16 (04) : 318 - 321