Abstract
Recently, Yang-Wang-Chang proposed an improvement to Yang-Shieh’s two password authentication schemes by using smart cards that can withstand a forged login attack. Yang-Wang-Chang’s improved schemes, however, are still susceptible such attacks. Accordingly, the current paper demonstrates the vulnerability of Yang-Wang-Chang’s schemes to these attacks and presents an improvements to resolve such a problem.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Herstein, I.N.: Topics in Algebra. Xerox Corporation (1975)
Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM 24, 770–772 (1981)
Wu, T.C.: Remote Login Authentication Scheme based on a Geometric Approach. Computer Communications 18(12), 959–963 (1995)
Yang, W.H., Shieh, S.P.: Password Authentication Scheme with Smart Cards. Computers & Security 18(8), 727–733 (1999)
Chan, C.K., Cheng, L.M.: Cryptanalysis of a Remote User Authentication Scheme using Smart Cards. IEEE Transaction on Consumer Electronics 46(4), 992–993 (2000)
Hwang, M.S., Li, L.H.: A New Remote User Authentication Scheme using Smart Cards. IEEE Transaction on Consumer Electronics 46(1), 28–30 (2000)
Sun, H.M.: An Efficient Remote User Authentication Scheme using Smart Cards. IEEE Transaction on Consumer Electronics 46(4), 958–961 (2000)
Lee, C.C., Hwang, M.S., Yang, W.P.: A Flexible Remote User Authentication Scheme using Smart Cards. ACM Operating Systems Review 36(3), 46–52 (2002)
Chan, C.K., Cheng, L.M.: Cryptanalysis of Timestamp-based Password Authentication Scheme. Computers & Security 21(1), 74–76 (2002)
Sun, H.M., Yeh, H.T.: Further Cryptanalysis of a Password Authentication Scheme with Smart Cards. IEICE Transactions on Communications E86-B(4), 1412–1415 (2003)
Chen, K.F.: Attacks on the (Enhanced) Yang-Shieh Authentication. Computers & Security 22(8), 725–727 (2003)
Yang, C.C., Wang, R.C., Chang, T.Y.: An Improvement of the Yang-Shieh Password Authentication Schemes. Applied Mathematics and Computation 162(3), 1391–1396 (2005)
Shen, J.J., Lin, C.W., Hwang, M.S.: Security Enhancement for the Timestamp-based Password Authentication Scheme using Smart Cards. Computers & Security 22(7), 591–595 (2003)
Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Security of shen et al.’s timestamp-based password authentication scheme. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3046, pp. 665–671. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yoon, EJ., Kim, WH., Yoo, KY. (2005). Security Enhancement for Password Authentication Schemes with Smart Cards. In: Katsikas, S., López, J., Pernul, G. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2005. Lecture Notes in Computer Science, vol 3592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11537878_31
Download citation
DOI: https://doi.org/10.1007/11537878_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28224-2
Online ISBN: 978-3-540-31796-8
eBook Packages: Computer ScienceComputer Science (R0)