Attacks and solutions of Yang et al.'s protected password changing scheme

被引:0
|
作者
Yoon, EJ [1 ]
Ryu, EK [1 ]
Yoo, KY [1 ]
机构
[1] Kyungpook Natl Univ, Dept Comp Engn, Taegu 702701, South Korea
关键词
cryptography; password; authentication; discrete logarithm; hash function;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Yang et al. proposed an improvement to Tseng et al.'s protected password changing scheme that can withstand denial of service attack. However, the improved scheme is still susceptible to stolen-verifier attack and denial of service attack. Accordingly, the current paper demonstrates the vulnerability of Yang et al's scheme to two simple attacks and presents an improved protected password change scheme to resolve such problems. In contrast to Yang et al.'s protected password changing scheme and the existing password change schemes using server's public key, the proposed scheme can securely update user passwords without a complicated process and server's public key.
引用
收藏
页码:285 / 294
页数:10
相关论文
共 50 条
  • [1] Weakness and solution of Yang et al.'s protected password changing scheme
    Yoon, EJ
    Yoo, KY
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 295 - 304
  • [2] An improvement on Yang et al.'s password authentication schemes
    Kim, KW
    Jeon, JC
    Yoo, KY
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (01) : 207 - 215
  • [3] Drawbacks of Liao et al.'s password authentication scheme
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, PROCEEDINGS, 2006, : 101 - +
  • [4] The Weakness of Moon et al.'s Password Authentication Scheme
    Irawan, Bam-bang
    Hwang, Min-shiang
    [J]. 3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [5] Attacks on the shen et al.'s timestamp-based password authentication scheme using smart cards
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (01) : 319 - 321
  • [6] Improvement of Yang et al.'s threshold proxy signature scheme
    Shao, Jun
    Cao, Zhenfu
    Lu, Rongxing
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (02) : 172 - 177
  • [7] Security of Shen et al.'s timestamp-based password authentication scheme
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 665 - 671
  • [8] Security of Lu et al.'s proxy-protected signature scheme
    Park, JH
    Kang, BG
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1010 - 1015
  • [9] Attacks to Li et al.'s Billing Service User Authentication Scheme
    Shieh, Wen-Gong
    Wang, Mei-Tzu
    [J]. MATERIALS, MECHANICAL ENGINEERING AND MANUFACTURE, PTS 1-3, 2013, 268-270 : 1762 - 1767
  • [10] Cryptanalysis of Yang et al.'s Handover Authentication Scheme For Mobile Network Environment
    Deng, Yong-Yuan
    Chen, Chin-Ling
    Shin, Jungpil
    Wang, Kun-hao
    [J]. 2017 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROLS (ISCSIC), 2017, : 152 - 157