An improvement on Yang et al.'s password authentication schemes

被引:8
|
作者
Kim, KW [1 ]
Jeon, JC [1 ]
Yoo, KY [1 ]
机构
[1] Kyungpook Natl Univ, Dept Comp Engn, Taegu, South Korea
关键词
authentication; forgery attack; password; smart card;
D O I
10.1016/j.amc.2004.11.040
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In 1999, Yang and Shieh proposed two password authentication schemes with smart cards; timestamp-based and nonce-based password authentication schemes. In 2003, Sun and Yeh pointed out that Yang and Shieh's password authentication schemes were vulnerable to the forgery attack. Recently, Yang et al. improved Yang and Shieh's schemes to resist Sun and Yeh's forgery attack. However, we shall show that Yang et al.'s schemes cannot withstand the forgery attack and then propose the improved schemes to resist the forgery attack. (c) 2005 Elsevier Inc. All rights reserved.
引用
收藏
页码:207 / 215
页数:9
相关论文
共 50 条
  • [1] Cryptanalysis and the improvement of Kim et al.'s password authentication schemes
    Giri, Debasis
    Srivastava, P. D.
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2007, 4812 : 156 - 166
  • [2] An improvement of the Yang-Shieh password authentication schemes
    Yang, CC
    Wang, RC
    Chang, TY
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (03) : 1391 - 1396
  • [3] Drawbacks of Liao et al.'s password authentication scheme
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, PROCEEDINGS, 2006, : 101 - +
  • [4] The Weakness of Moon et al.'s Password Authentication Scheme
    Irawan, Bam-bang
    Hwang, Min-shiang
    [J]. 3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [5] Attacks and solutions of Yang et al.'s protected password changing scheme
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    [J]. INFORMATICA, 2005, 16 (02) : 285 - 294
  • [6] Weakness and solution of Yang et al.'s protected password changing scheme
    Yoon, EJ
    Yoo, KY
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 295 - 304
  • [7] Comment on Xu et al.'s Key Agreement and Password Authentication Protocol
    Guo, Yongning
    Liu, Chenglian
    [J]. FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 3847 - +
  • [8] Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments
    Chung, Hao-Rung
    Ku, Wei-Chi
    Tsaur, Maw-Jinn
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) : 863 - 868
  • [9] Security of Shen et al.'s timestamp-based password authentication scheme
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 665 - 671
  • [10] Improvement on Peyravian-Zunic's password authentication schemes
    Hwang, JJ
    Yeh, TC
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2002, E85B (04) : 823 - 825