๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Security improvement on a timestamp-based password authentication scheme

โœ Scribed by Yingjie Wang; Jianhua Li


Book ID
117909639
Publisher
IEEE
Year
2004
Tongue
English
Weight
370 KB
Volume
50
Category
Article
ISSN
0098-3063

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


An enhancement of timestamp-based passwo
โœ Lei Fan; Jian-Hua Li; Hong-Wen Zhu ๐Ÿ“‚ Article ๐Ÿ“… 2002 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 92 KB

Yang and Shieh proposed a timestamp-based password authentication scheme. Chan and Cheng proved that it is insecure. In this paper, we will give a further cryptanalysis of the scheme, and give an easier attack on it. Finally, we will propose an improved scheme that can withstand both of the attacks.

Security enhancement for the timestamp-b
โœ Jau-Ji Shen; Chih-Wei Lin; Min-Shiang Hwang ๐Ÿ“‚ Article ๐Ÿ“… 2003 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 272 KB

In 1999, Yang and Shieh proposed a timestamp-based password authentication scheme with smart cards. However, Chan and Cheng showed that it was insecure because the scheme was vulnerable to the forged login attack. In this paper, we propose a modified Yang-Shieh scheme to enhance security. Our modifi

Cryptanalysis of an enhanced timestamp-b
โœ Bin Wang; Jian-Hua Li; Zhi-Peng Tong ๐Ÿ“‚ Article ๐Ÿ“… 2003 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 105 KB

Recently, Fan proposed an enhanced scheme to improve the security of Yang-Shieh's timestamp-based password authentication scheme. The enhanced scheme can withstand the attacks presented by Chan, Cheng and Fan. In this paper, we show that the enhanced scheme is still insecure. An intruder is able to

A password authentication scheme with se
โœ Chun-Li Lin; Tzonelih Hwang ๐Ÿ“‚ Article ๐Ÿ“… 2003 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 109 KB

## Recently, Hwang and Yeh proposed an improvement on the Peyravian-Zunic password scheme. The Hwang-Yeh scheme comprises a password authentication protocol, a password change protocol, and can also provide key distribution. Though the Hwang-Yeh scheme repaired several security problems of the Peyra