Comments on Yeh-Shen-Hwang's One-Time Password Authentication Scheme

نویسندگان

  • Il-Sun You
  • Kyungsan Cho
چکیده

The S/Key one-time password scheme is designed to counter replay attacks or eavesdropping attacks [2], [3]. With this scheme, the user’s secret pass-phrase never needs to cross the network at any time such as during authentication or during pass-phrase changes. Moreover, no secret information need be stored on any system, including the server being protected. Although the S/KEY scheme thus protects against passive attacks based on replaying captured reusable passwords, it is vulnerable to server spoofing attacks, preplay attacks and off-line dictionary attacks [1], [4], [5]. Recently, Yeh, Shen and Hwang proposed a one-time password authentication scheme, which enhances the S/KEY scheme to resist against the above attacks [1]. The authentication scheme uses smart cards to securely preserve a pre-shared secret S EED and simplify the user login process. In addition, it provides a session key to enable confidential communication over the network. Although their scheme can overcome the flaws of the S/KEY scheme as they claimed, we discover that it is vulnerable to other attacks such as denial of service attacks, stolen-verifier attacks and Denning-Sacco attacks [5]–[7]. Because the scheme uses a pre-shared secret S EED and the user’s weak pass-phrase, the leakage of S EED causes the scheme to retain the flaws of the S/KEY scheme. In this letter, the weaknesses and inconveniences of Yeh-Shen-Hwang’s scheme are demonstrated.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of Yeh-Shen-Hwang's One-Time Password Authentication Scheme

The well-known S/KEY one-time password scheme was designed to counter eavesdropping and replay attacks [1]. The success of S/KEY stems from its efficiency and simplicity as well as its security property. S/KEY uses simple hash functions and does not require other complex cryptographic primitives. Even though S/KEY is immune to eavesdropping and replay attacks, it is susceptible to preplay attac...

متن کامل

Improvement of One-Time Password Authentication Scheme Using Smart Cards

In 2002, Yeh, Shen, and Hwang proposed a one-time password authentication scheme using smart cards. However, Tsuji et al. and Ku et al. showed that it is vulnerable to the stolen verifier attack. Therefore, this paper proposes an improved one-time password authentication scheme, which not only keeps the security of the scheme of Yeh-Shen-Hwang but also can withstand the stolen verifier attack. ...

متن کامل

An improvement of the Yang-Shieh password authentication schemes

Recently, Yang and Shieh proposed two password authentication schemes by employing smart cards. One is a timestamp-based password authentication scheme and the other is a nonce-based password authentication scheme. In 2002, Chan and Cheng pointed out that Yang and Shieh’s timestamp-based password authentication scheme was vulnerable to the forgery attack. However, in 2003, Sun and Yeh pointed o...

متن کامل

Weaknesses and Improvements of Yang-Chang-Hwang's Password Authentication Scheme

In 2001, Tseng, Jan, and Chien proposed an improved version of Peyravian–Zunic’s password authentication scheme based on the Diffie–Hellman scheme. Later, Yang, Chang, and Hwang demonstrated that Tseng–Jan–Chien’s scheme is vulnerable to a modification attack, and then described an improved scheme. In this paper, we show that Yang–Chang–Hwang’s scheme is still vulnerable to a denial-of-service ...

متن کامل

Cryptanalysis of Liao-Lee-Hwang's Dynamic ID Scheme

Recently, Das, Saxena and Gulati proposed a dynamic Id based remote user authentication scheme that allows the users to choose and change their passwords freely and does not maintain verifier table. But their scheme has few weaknesses and cannot achieve mutual authentication. In 2005, Liao, Lee and Hwang showed that Das et al. scheme is vulnerable to guessing attack and proposed an enhanced sch...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEICE Transactions

دوره 88-B  شماره 

صفحات  -

تاریخ انتشار 2005