Further cryptanalysis of a password authentication scheme with smart cards

被引:0
|
作者
Sun, HM [1 ]
Yeh, HT
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
关键词
password authentication; smart card; network security; ID-based scheme; cryptanalysis;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Following the developments in the use of ID-based schemes and smart cards, Yang and Shieh proposed two password authentication schemes to achieve two purposes: (1) to allow users to choose and change their passwords freely, and (2) to make it unnecessary for the remote server to maintain a directory of passwords or a verification table to authenticate users. Recently, Chan and Cheng showed that Yang and Shieh's timestamp-based password authentication scheme is insecure against forgery. In this paper, we point out that Chan and Cheng's forgery attack can not work. Thus, we further examine the security of Yang and Shieh's password authentication schemes and find that they are insecure against forgery because one adversary can easily pretend to be a valid user and pass the server's verification which allows the adversary to login to the the remote server.
引用
收藏
页码:1412 / 1415
页数:4
相关论文
共 50 条
  • [1] Cryptanalysis of Yang-Wang-Chang's password authentication scheme with smart cards
    Pathan, Al-Sakib Khan
    Hong, Choong Seon
    [J]. 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 1618 - 1620
  • [2] Further cryptanalysis of 'A user friendly remote user authentication scheme with smart cards'
    Khan, Muhammad Khurram
    [J]. ICIET 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND EMERGING TECHNOLOGIES, 2007, : 101 - 105
  • [3] Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards
    Yang, CC
    Yang, HW
    Wang, RC
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 578 - 579
  • [4] Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards
    He, Debiao
    Wang, Ding
    Wu, Shuhua
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (02): : 170 - 177
  • [5] Cryptanalysis and security enhancement of two password authentication schemes with smart cards
    Khan, Muhammad Khurram
    [J]. INMIC 2007: PROCEEDINGS OF THE 11TH IEEE INTERNATIONAL MULTITOPIC CONFERENCE, 2007, : 74 - 77
  • [6] Remote Password Authentication Scheme with Smart Cards and Biometrics
    Fan, Chun-I
    Lin, Yi-Hui
    Hsu, Ruei-Hau
    [J]. GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [7] Cryptanalysis of two password-based authentication schemes using smart cards
    Phan, RCW
    [J]. COMPUTERS & SECURITY, 2006, 25 (01) : 52 - 54
  • [8] An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards
    Chang, Chin-Chen
    Tsai, Hao-Chuan
    Chen, Yi-Hui
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2007, 1 (02): : 33 - 40
  • [9] Cryptanalysis of timestamp-based password authentication schemes using smart cards
    Wang, Guilin
    Bao, Feng
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 399 - +
  • [10] An enhanced password authentication scheme providing password updating without smart cards
    Chang, Chin-Chen
    Tsai, Hao-Chuan
    Chen, Yi-Hui
    [J]. MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 1210 - +