Comments on Yeh-Shen-Hwang's One-Time Password Authentication Scheme
نویسندگان
چکیده
The S/Key one-time password scheme is designed to counter replay attacks or eavesdropping attacks [2], [3]. With this scheme, the user’s secret pass-phrase never needs to cross the network at any time such as during authentication or during pass-phrase changes. Moreover, no secret information need be stored on any system, including the server being protected. Although the S/KEY scheme thus protects against passive attacks based on replaying captured reusable passwords, it is vulnerable to server spoofing attacks, preplay attacks and off-line dictionary attacks [1], [4], [5]. Recently, Yeh, Shen and Hwang proposed a one-time password authentication scheme, which enhances the S/KEY scheme to resist against the above attacks [1]. The authentication scheme uses smart cards to securely preserve a pre-shared secret S EED and simplify the user login process. In addition, it provides a session key to enable confidential communication over the network. Although their scheme can overcome the flaws of the S/KEY scheme as they claimed, we discover that it is vulnerable to other attacks such as denial of service attacks, stolen-verifier attacks and Denning-Sacco attacks [5]–[7]. Because the scheme uses a pre-shared secret S EED and the user’s weak pass-phrase, the leakage of S EED causes the scheme to retain the flaws of the S/KEY scheme. In this letter, the weaknesses and inconveniences of Yeh-Shen-Hwang’s scheme are demonstrated.
منابع مشابه
Cryptanalysis of Yeh-Shen-Hwang's One-Time Password Authentication Scheme
The well-known S/KEY one-time password scheme was designed to counter eavesdropping and replay attacks [1]. The success of S/KEY stems from its efficiency and simplicity as well as its security property. S/KEY uses simple hash functions and does not require other complex cryptographic primitives. Even though S/KEY is immune to eavesdropping and replay attacks, it is susceptible to preplay attac...
متن کاملImprovement of One-Time Password Authentication Scheme Using Smart Cards
In 2002, Yeh, Shen, and Hwang proposed a one-time password authentication scheme using smart cards. However, Tsuji et al. and Ku et al. showed that it is vulnerable to the stolen verifier attack. Therefore, this paper proposes an improved one-time password authentication scheme, which not only keeps the security of the scheme of Yeh-Shen-Hwang but also can withstand the stolen verifier attack. ...
متن کاملAn improvement of the Yang-Shieh password authentication schemes
Recently, Yang and Shieh proposed two password authentication schemes by employing smart cards. One is a timestamp-based password authentication scheme and the other is a nonce-based password authentication scheme. In 2002, Chan and Cheng pointed out that Yang and Shieh’s timestamp-based password authentication scheme was vulnerable to the forgery attack. However, in 2003, Sun and Yeh pointed o...
متن کاملWeaknesses and Improvements of Yang-Chang-Hwang's Password Authentication Scheme
In 2001, Tseng, Jan, and Chien proposed an improved version of Peyravian–Zunic’s password authentication scheme based on the Diffie–Hellman scheme. Later, Yang, Chang, and Hwang demonstrated that Tseng–Jan–Chien’s scheme is vulnerable to a modification attack, and then described an improved scheme. In this paper, we show that Yang–Chang–Hwang’s scheme is still vulnerable to a denial-of-service ...
متن کاملCryptanalysis of Liao-Lee-Hwang's Dynamic ID Scheme
Recently, Das, Saxena and Gulati proposed a dynamic Id based remote user authentication scheme that allows the users to choose and change their passwords freely and does not maintain verifier table. But their scheme has few weaknesses and cannot achieve mutual authentication. In 2005, Liao, Lee and Hwang showed that Das et al. scheme is vulnerable to guessing attack and proposed an enhanced sch...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEICE Transactions
دوره 88-B شماره
صفحات -
تاریخ انتشار 2005