𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Cryptanalysis of an enhanced timestamp-based password authentication scheme

✍ Scribed by Bin Wang; Jian-Hua Li; Zhi-Peng Tong


Publisher
Elsevier Science
Year
2003
Tongue
English
Weight
105 KB
Volume
22
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.

✦ Synopsis


Recently, Fan proposed an enhanced scheme to improve the security of Yang-Shieh's timestamp-based password authentication scheme. The enhanced scheme can withstand the attacks presented by Chan, Cheng and Fan. In this paper, we show that the enhanced scheme is still insecure. An intruder is able to construct a forged login request by intercepting the legitimate login requests and pass the system authentication with a nonnegligible probability.


πŸ“œ SIMILAR VOLUMES


An enhancement of timestamp-based passwo
✍ Lei Fan; Jian-Hua Li; Hong-Wen Zhu πŸ“‚ Article πŸ“… 2002 πŸ› Elsevier Science 🌐 English βš– 92 KB

Yang and Shieh proposed a timestamp-based password authentication scheme. Chan and Cheng proved that it is insecure. In this paper, we will give a further cryptanalysis of the scheme, and give an easier attack on it. Finally, we will propose an improved scheme that can withstand both of the attacks.

Security enhancement for the timestamp-b
✍ Jau-Ji Shen; Chih-Wei Lin; Min-Shiang Hwang πŸ“‚ Article πŸ“… 2003 πŸ› Elsevier Science 🌐 English βš– 272 KB

In 1999, Yang and Shieh proposed a timestamp-based password authentication scheme with smart cards. However, Chan and Cheng showed that it was insecure because the scheme was vulnerable to the forged login attack. In this paper, we propose a modified Yang-Shieh scheme to enhance security. Our modifi

Cryptanalysis of β€œan identity-based soci
✍ Zuhua Shao πŸ“‚ Article πŸ“… 2003 πŸ› Elsevier Science 🌐 English βš– 63 KB

In this paper, we show that the identity-based society oriented signature scheme with anonymous signers proposed by Saeednia is insecure. If some members of a given group leave that group or if some new members join the group, their secret keys would be revealed. We also propose a simple way to fulf