earticle

논문검색

An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards

초록

영어

In 2003, Yang, Chang, and Hwang proposed an enhanced scheme of Peyravivan-Zunic’s
password authentication scheme by using the Diffie-Hellman scheme. Later, Yoon, Ryu, and
Yoo demonstrated that Yang-Chang-Hwang’s scheme is vulnerable to a stolen-verifier attack
and a denial-of-service attack, and then proposed an improved scheme. In this paper, we
show that Yoon-Ryu-Yoo’s scheme is still vulnerable to a stolen-verifier attack and a server
spoofing attack under some reasonable assumption. In addition, we propose an improved
scheme to eliminate such security flaws.

목차

Abstract
 1. Introduction
 2. A Review and the Security Flaw of Yoon-Ryu-Yoo’s Scheme
  2.1 A Review of Yoon-Ryu-Yoo’s Scheme
  2.2 The Security Flaw of Yoon-Ryu-Yoo’s Scheme
 3. The Proposed Scheme
  3.1 The Proposed Password Change Protocol
 4. Security Analysis
  4.1 The Security Strength against the Replay Attack
  4.2 The Security Strength against the Stolen-verifier Attack
  4.3 The Security Strength against the Password Guessing Attack
  4.4 The Security Strength against the Denied-of-Service Attack
  4.5 The Security Strength against the Server Spoofing Attack
 5. Conclusions
 6. References

저자정보

  • Chin-Chen Chang Department of Computer Science and Information Engineering, Feng Chia University, Taichung, Taiwan, 40724, R.O.C. and Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan, 621, R.O.C.
  • Hao-Chuan Tsai Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan, 621, R.O.C.
  • Yi-Hui Chen Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan, 621, R.O.C.

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.