Further cryptanalysis of a password authentication scheme with smart cards

被引:0
|
作者
Sun, HM [1 ]
Yeh, HT
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 701, Taiwan
关键词
password authentication; smart card; network security; ID-based scheme; cryptanalysis;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Following the developments in the use of ID-based schemes and smart cards, Yang and Shieh proposed two password authentication schemes to achieve two purposes: (1) to allow users to choose and change their passwords freely, and (2) to make it unnecessary for the remote server to maintain a directory of passwords or a verification table to authenticate users. Recently, Chan and Cheng showed that Yang and Shieh's timestamp-based password authentication scheme is insecure against forgery. In this paper, we point out that Chan and Cheng's forgery attack can not work. Thus, we further examine the security of Yang and Shieh's password authentication schemes and find that they are insecure against forgery because one adversary can easily pretend to be a valid user and pass the server's verification which allows the adversary to login to the the remote server.
引用
收藏
页码:1412 / 1415
页数:4
相关论文
共 50 条
  • [41] Cryptanalysis of a multi-server password authenticated key agreement scheme using smart cards
    Ku, WC
    Chuang, HM
    Chiang, MH
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (11) : 3235 - 3238
  • [42] CRYPTANALYSIS OF A PASSWORD AUTHENTICATION SCHEME USING QUADRATIC RESIDUES
    CHANG, CC
    WU, TC
    LAIH, CS
    [J]. COMPUTER COMMUNICATIONS, 1995, 18 (01) : 45 - 47
  • [43] Cryptanalysis of a password authentication scheme over insecure networks
    Xiang, Tao
    Wong, Kwok-Wo
    Liao, Xiaofeng
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2008, 74 (05) : 657 - 661
  • [44] Cryptanalysis of a timestamp-based password authentication scheme
    Chan, Chi-Kwong
    Cheng, L.M.
    [J]. Computers and Security, 2001, 21 (01): : 74 - 76
  • [45] Cryptanalysis of a timestamp-based password authentication scheme
    Chan, CK
    Cheng, LM
    [J]. COMPUTERS & SECURITY, 2002, 21 (01) : 74 - 76
  • [46] Cryptanalysis and Enhancement of a Password-Based Authentication Scheme
    Eldefrawy, Mohamed H.
    Al-Muhtadi, Jalal F.
    [J]. 2015 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2015, : 548 - 551
  • [47] Cryptanalysis of 'An Improved Remote Password Authentication Scheme with Smartcard'
    Khan, Muhammad Khurram
    He, Debiao
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1708 - 1710
  • [48] An efficient and secure multi-server password authentication scheme using smart cards
    [J]. Chang, C.-C. (ccc@cs.ccu.edu.tw), (IEEE Computer Society):
  • [49] A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS
    Chen, Bae-Ling
    Kuo, Wen-Chung
    Wuu, Lih-Chyau
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (01): : 53 - 59
  • [50] Security improvement on the timestamp-based password authentication scheme using smart cards
    Wang, Xiaomin
    Zhang, Jiashu
    Zhang, Wenfang
    Khan, Muhammad Khurram
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF INTELLIGENT SYSTEMS, 2006, : 140 - +