Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments

  • Authors:
  • Hao-Rung Chung;Wei-Chi Ku;Maw-Jinn Tsaur

  • Affiliations:
  • Department of Computer Science and Information Engineering, Fu Jen Catholic University, Taipei, Taiwan, ROC;Department of Computer and Information Science, National Taichung University, Taichung, Taiwan, ROC;Graduate Institute of Applied Science and Engineering, Fu Jen Catholic University, Taipei, Taiwan, ROC

  • Venue:
  • Computer Standards & Interfaces
  • Year:
  • 2009

Quantified Score

Hi-index 0.01

Visualization

Abstract

Recently, Wang et al. showed that two new verifier-free remote user password authentication schemes, Ku-Chen's scheme and Yoon et al.'s scheme, are vulnerable to an off-line password guessing attack, a forgery attack, and a denial-of-service attack, and then proposed an improved scheme for the real application in resource-limited environments. Unfortunately, we find that Wang et al.'s scheme is still vulnerable to an impersonation attack and an off-line password guessing attack. In addition, Wang et al.'s scheme is not easily reparable and is unable to provide perfect forward secrecy. Finally, we propose an improved scheme with better security strength.