Weaknesses and Improvements of Yang–Chang–Hwang’s Password Authentication Scheme
نویسندگان
چکیده
منابع مشابه
Weaknesses and Improvements of Yang-Chang-Hwang's Password Authentication Scheme
In 2001, Tseng, Jan, and Chien proposed an improved version of Peyravian–Zunic’s password authentication scheme based on the Diffie–Hellman scheme. Later, Yang, Chang, and Hwang demonstrated that Tseng–Jan–Chien’s scheme is vulnerable to a modification attack, and then described an improved scheme. In this paper, we show that Yang–Chang–Hwang’s scheme is still vulnerable to a denial-of-service ...
متن کاملWeaknesses and Improvements of a One-time Password Authentication Scheme
Authentication of communicating entities and confidentiality of transmitted data are fundamental procedures to establish secure communications over public insecure networks. Recently, many researchers proposed a variety of authentication schemes to confirm legitimate users. Among the authentication schemes, a one-time password authentication scheme requires less computation and considers the li...
متن کاملWeaknesses of Password Authentication Scheme Based on Geometric Hashing
We show that a recently proposed password authentication scheme based on geometric hashing has several security weaknesses, and that the use of this scheme should be avoided in practice.
متن کاملWeaknesses of Temporal Credential-Based Mutual Authentication with a Multiple-Password Scheme for Wireless Sensor Networks
Wireless sensor networks are significant technologies in various fields. For example, they are used for monitoring dangerous places, medical and environmental monitoring, and military surveillance. Various studies have focused on the authentication scheme for wireless sensor networks. However, it is difficult to achieve perfect security performance and low overhead. Liu et al. proposed a scheme...
متن کاملImprovements on two password-based authentication protocols
Recently, Liao et al. and Hölbl et al. each proposed a user authentication protocol, respectively. Both claimed that their schemes can withstand various attacks. However, Xiang et al. pointed out Liao et al.’s protocol suffers from three kinds of attacks, the replay attack, the guessing attack, and the Denial-of-service (DoS) attack. Moreover, we and Munilla et al. also found Hölbl et al.’s pro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Informatica
سال: 2005
ISSN: 0868-4952,1822-8844
DOI: 10.15388/informatica.2005.094