An improvement of the Yang-Shieh password authentication schemes

نویسندگان

  • Chou Chen Yang
  • Ren-Chiun Wang
  • Ting Yi Chang
چکیده

Recently, Yang and Shieh proposed two password authentication schemes by employing smart cards. One is a timestamp-based password authentication scheme and the other is a nonce-based password authentication scheme. In 2002, Chan and Cheng pointed out that Yang and Shieh’s timestamp-based password authentication scheme was vulnerable to the forgery attack. However, in 2003, Sun and Yeh pointed out that Chan and Cheng’s attack was unreasonable. At the same time, Sun and Yeh pointed out that Yang and Shieh’s password authentication schemes were still vulnerable to the forgery attack. In this paper, we shall improve Yang and Shieh’s schemes to resist Sun and Yeh’s attack. 2004 Elsevier Inc. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of the Yang -Wang's password authentication schemes

In 1999, Yang and shieh proposed two password authentication schemes using smart cards. But in 2003, Sun and Yeh indicated that their schemes are subject to the forgery attack. So in 2005, Yang and Wang proposed an improvement of Yang and Shieh’s schemes to resist against Sun and Yeh’s attack. However in this paper, we will point out that Yang and Wang’s schemes still suffer from the forgery at...

متن کامل

Attacks on the (enhanced) Yang-Shieh authentication

The Yang-Shieh authentication is a timestamp based password authentication scheme that uses smart cards [1]. In [2,3], various attacks on this scheme are described. However, an enhancement of the scheme is proposed in [3] and enables the scheme to resist these existing attacks. In this paper, we show two new attack that can break the enhanced scheme. We further point out that the fundamental co...

متن کامل

Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards

Password authentication is an important mechanism for remote login systems, where only authorized users can be authenticated via using their passwords and/or some similar secrets. In 1999, Yang and Shieh [14] proposed two password authentication schemes using smart cards. Their schemes are not only very efficient, but also allow users to change their passwords freely and the server has no need ...

متن کامل

Password authentication schemes with smart cards

In this paper, two password authentication schemes with smart cards are proposed. In the schemes, users can change their passwords freely, and the remote system does not need the directory of passwords or verification tables to authenticate users. Once the secure network environment is set up, authentication can be handled solely by the two parties involved. For a network without synchronized c...

متن کامل

Cryptanalysis of Two Improved Password Authentication Schemes Using Smart Cards

Recently, Yang et al. improved Yang and Shieh’s two password authentication schemes to withstand Sun and Yeh’s forgery attacks. However, Kim et al. pointed out that Yang et al.’s improvements still cannot withstand forgery attacks. At the same time, Kim et al. proposed improved methods. In this paper, we shall show that Kim et al.’s improvements also cannot resist the forgery attacks.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Applied Mathematics and Computation

دوره 162  شماره 

صفحات  -

تاریخ انتشار 2005