Further cryptanalysis of a password authentication scheme with smart cards

被引:0
|
作者
Sun, HM [1 ]
Yeh, HT
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
关键词
password authentication; smart card; network security; ID-based scheme; cryptanalysis;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Following the developments in the use of ID-based schemes and smart cards, Yang and Shieh proposed two password authentication schemes to achieve two purposes: (1) to allow users to choose and change their passwords freely, and (2) to make it unnecessary for the remote server to maintain a directory of passwords or a verification table to authenticate users. Recently, Chan and Cheng showed that Yang and Shieh's timestamp-based password authentication scheme is insecure against forgery. In this paper, we point out that Chan and Cheng's forgery attack can not work. Thus, we further examine the security of Yang and Shieh's password authentication schemes and find that they are insecure against forgery because one adversary can easily pretend to be a valid user and pass the server's verification which allows the adversary to login to the the remote server.
引用
收藏
页码:1412 / 1415
页数:4
相关论文
共 50 条
  • [21] Cryptanalysis of a User Anonymous Password Authentication Scheme Without Smart Card
    Lin, Hao
    Wen, Feng-Tong
    Du, Chun-Xia
    [J]. 2016 INTERNATIONAL CONFERENCE ON SERVICE SCIENCE, TECHNOLOGY AND ENGINEERING (SSTE 2016), 2016, : 293 - 298
  • [22] Cryptanalysis of an Efficient and Secure Smart Card Based Password Authentication Scheme
    Liu, Chi-Wei
    Tsai, Cheng-Yi
    Hwang, Min-Shiang
    [J]. RECENT DEVELOPMENTS IN INTELLIGENT SYSTEMS AND INTERACTIVE APPLICATIONS (IISA2016), 2017, 541 : 188 - 193
  • [23] Cryptanalysis of two efficient password-based authentication schemes using smart cards
    Department of computer science and technology, Taiyuan University of Technology, Taiyuan
    030024, China
    [J]. Int. J. Netw. Secur., 6 (728-735):
  • [24] REMOTE PASSWORD AUTHENTICATION WITH SMART CARDS
    CHANG, CC
    LAIH, CS
    [J]. IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1992, 139 (04): : 372 - 372
  • [25] Password authentication schemes with smart cards
    Yang, WH
    Shieh, SP
    [J]. COMPUTERS & SECURITY, 1999, 18 (08) : 727 - 733
  • [26] REMOTE PASSWORD AUTHENTICATION WITH SMART CARDS
    CHANG, CC
    WU, TC
    [J]. IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1991, 138 (03): : 165 - 168
  • [27] Enhancing of a Password-Based Authentication Scheme Using Smart Cards
    Lee, Youngsook
    Won, Dongho
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2009, PT 2, 2009, 5871 : 879 - +
  • [28] Cryptanalysis and Improvement of a Remote User Authentication Scheme using Smart Cards
    Giri, Debasis
    Srivastava, P. D.
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 355 - 361
  • [29] Mutual authentication scheme with smart cards and password under trusted computing
    Yang, Li
    Ma, Jian-Feng
    Jiang, Qi
    [J]. International Journal of Network Security, 2012, 14 (03) : 156 - 163
  • [30] Cryptanalysis of a modified remote user authentication scheme using smart cards
    Leung, KC
    Cheng, LM
    Fong, AS
    Chan, CK
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2003, 49 (04) : 1243 - 1245