An improvement of the Yang-Shieh password authentication schemes

Chou Chen Yang, Ren Chiun Wang, Ting-Yi  Chang

Research output: Contribution to journalArticle

41 Citations (Scopus)

Abstract

Recently, Yang and Shieh proposed two password authentication schemes by employing smart cards. One is a timestamp-based password authentication scheme and the other is a nonce-based password authentication scheme. In 2002, Chan and Cheng pointed out that Yang and Shieh's timestamp-based password authentication scheme was vulnerable to the forgery attack. However, in 2003, Sun and Yeh pointed out that Chan and Cheng's attack was unreasonable. At the same time, Sun and Yeh pointed out that Yang and Shieh's password authentication schemes were still vulnerable to the forgery attack. In this paper, we shall improve Yang and Shieh's schemes to resist Sun and Yeh's attack.

Original languageEnglish
Pages (from-to)1391-1396
Number of pages6
JournalApplied Mathematics and Computation
Volume162
Issue number3
DOIs
Publication statusPublished - 2005 Mar 25

Fingerprint

Password Authentication
Authentication
Sun
Attack
Timestamp
Smart cards
Smart Card
Resist

All Science Journal Classification (ASJC) codes

  • Computational Mathematics
  • Applied Mathematics

Cite this

Yang, Chou Chen ; Wang, Ren Chiun ; Chang, Ting-Yi . / An improvement of the Yang-Shieh password authentication schemes. In: Applied Mathematics and Computation. 2005 ; Vol. 162, No. 3. pp. 1391-1396.
@article{8859c7c0978b4426811f57cd4c593fd8,
title = "An improvement of the Yang-Shieh password authentication schemes",
abstract = "Recently, Yang and Shieh proposed two password authentication schemes by employing smart cards. One is a timestamp-based password authentication scheme and the other is a nonce-based password authentication scheme. In 2002, Chan and Cheng pointed out that Yang and Shieh's timestamp-based password authentication scheme was vulnerable to the forgery attack. However, in 2003, Sun and Yeh pointed out that Chan and Cheng's attack was unreasonable. At the same time, Sun and Yeh pointed out that Yang and Shieh's password authentication schemes were still vulnerable to the forgery attack. In this paper, we shall improve Yang and Shieh's schemes to resist Sun and Yeh's attack.",
author = "Yang, {Chou Chen} and Wang, {Ren Chiun} and Ting-Yi  Chang",
year = "2005",
month = "3",
day = "25",
doi = "10.1016/j.amc.2004.03.017",
language = "English",
volume = "162",
pages = "1391--1396",
journal = "Applied Mathematics and Computation",
issn = "0096-3003",
publisher = "Elsevier Inc.",
number = "3",

}

An improvement of the Yang-Shieh password authentication schemes. / Yang, Chou Chen; Wang, Ren Chiun; Chang, Ting-Yi .

In: Applied Mathematics and Computation, Vol. 162, No. 3, 25.03.2005, p. 1391-1396.

Research output: Contribution to journalArticle

TY - JOUR

T1 - An improvement of the Yang-Shieh password authentication schemes

AU - Yang, Chou Chen

AU - Wang, Ren Chiun

AU - Chang, Ting-Yi 

PY - 2005/3/25

Y1 - 2005/3/25

N2 - Recently, Yang and Shieh proposed two password authentication schemes by employing smart cards. One is a timestamp-based password authentication scheme and the other is a nonce-based password authentication scheme. In 2002, Chan and Cheng pointed out that Yang and Shieh's timestamp-based password authentication scheme was vulnerable to the forgery attack. However, in 2003, Sun and Yeh pointed out that Chan and Cheng's attack was unreasonable. At the same time, Sun and Yeh pointed out that Yang and Shieh's password authentication schemes were still vulnerable to the forgery attack. In this paper, we shall improve Yang and Shieh's schemes to resist Sun and Yeh's attack.

AB - Recently, Yang and Shieh proposed two password authentication schemes by employing smart cards. One is a timestamp-based password authentication scheme and the other is a nonce-based password authentication scheme. In 2002, Chan and Cheng pointed out that Yang and Shieh's timestamp-based password authentication scheme was vulnerable to the forgery attack. However, in 2003, Sun and Yeh pointed out that Chan and Cheng's attack was unreasonable. At the same time, Sun and Yeh pointed out that Yang and Shieh's password authentication schemes were still vulnerable to the forgery attack. In this paper, we shall improve Yang and Shieh's schemes to resist Sun and Yeh's attack.

UR - http://www.scopus.com/inward/record.url?scp=12244291938&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=12244291938&partnerID=8YFLogxK

U2 - 10.1016/j.amc.2004.03.017

DO - 10.1016/j.amc.2004.03.017

M3 - Article

AN - SCOPUS:12244291938

VL - 162

SP - 1391

EP - 1396

JO - Applied Mathematics and Computation

JF - Applied Mathematics and Computation

SN - 0096-3003

IS - 3

ER -