Attacks and solutions of Yang et al.'s protected password changing scheme

被引:0
|
作者
Yoon, EJ [1 ]
Ryu, EK [1 ]
Yoo, KY [1 ]
机构
[1] Kyungpook Natl Univ, Dept Comp Engn, Taegu 702701, South Korea
关键词
cryptography; password; authentication; discrete logarithm; hash function;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Yang et al. proposed an improvement to Tseng et al.'s protected password changing scheme that can withstand denial of service attack. However, the improved scheme is still susceptible to stolen-verifier attack and denial of service attack. Accordingly, the current paper demonstrates the vulnerability of Yang et al's scheme to two simple attacks and presents an improved protected password change scheme to resolve such problems. In contrast to Yang et al.'s protected password changing scheme and the existing password change schemes using server's public key, the proposed scheme can securely update user passwords without a complicated process and server's public key.
引用
收藏
页码:285 / 294
页数:10
相关论文
共 50 条
  • [21] Commentary on the work of Yang MJ et al.
    Yang, Min Jae
    Shin, Sung Jae
    Lee, Ki Seong
    Lee, Kee Myung
    Lim, Sun Gyo
    Kang, Joon Koo
    Hwang, Jae Chul
    Kim, Soon Sun
    Lee, Dakeun
    Kim, Joo-Sung
    Lee, Gil-Ho
    Ryu, Han Seok
    Yoo, Byung Moo
    Lee, Kwang Jae
    Kim, Young Bae
    Kim, Jin Hong
    [J]. ENDOSCOPY, 2015, 47 (07)
  • [22] Reply to Dr. Yang et al.
    Uslu, Yasemin
    Aydal, Pinar
    Ulus, Bahire
    [J]. JOURNAL OF PERIANESTHESIA NURSING, 2023, 38 (06) : 838 - 839
  • [23] On the security of Yuan et al.'s undeniable signature scheme
    Zhao, Wei
    [J]. International Journal of Network Security, 2010, 11 (03) : 177 - 180
  • [24] Improvement of Tseng et al.'s authenticated encryption scheme
    Hwang, SJ
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 165 (01) : 1 - 4
  • [25] Improvement of Li et al.'s proxy signature scheme
    Dept. of Electrical and Computer Eng., Kangwon National University, Chuncheon, Korea, Republic of
    不详
    [J]. WSEAS Trans. Syst., 2006, 1 (305-311):
  • [26] Cryptanalysis and improvement on Chang et al.'s signature scheme
    Wang, Qing-Long
    Han, Zhen
    Geng, Xiu-Hua
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 112 - 114
  • [27] On the application of decomposition methods - Yang et al. Respond
    Yang, Quanhe
    Greenland, Sander
    Flanders, W. Dana
    [J]. AMERICAN JOURNAL OF PUBLIC HEALTH, 2006, 96 (11) : 1899 - 1901
  • [28] Prophylactic octreotide in pancreatoduodenectomy: response to Yang et al.
    McMillan, Matthew T.
    Vollmer, Charles M., Jr.
    [J]. HPB, 2015, 17 (04) : 372 - 372
  • [29] Cryptanalysis of Zhou et al.'s proxy-protected signature schemes
    Park, JH
    Kang, BG
    Han, JW
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 192 - 197
  • [30] New Forgery Attack on Chang et al.'s signature scheme
    Li, Kou
    Ming, Jin
    [J]. PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 : 5 - 6