Cryptanalysis and improvement on Yang-Shieh authentication schemes
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
A Security Enhanced Timestamp-Based Password Authentication Scheme Using Smart Cards
IEICE - Transactions on Information and Systems
Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
Cryptanalysis of timestamp-based password authentication schemes using smart cards
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Efficient remote user authentication and key establishment for multi-server environment
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
Hi-index | 0.43 |
Recently, Yang and Shieh proposed two password authentication schemes. In 2002, Chan and Cheng pointed out that Yang and Shieh's timestamp-based authentication scheme was vulnerable to the forgery attack. In 2003, Sun and Yeh pointed out that Yang and Shieh's scheme was vulnerable to the forgery attack and explained Chan and Cheng's attack was unreasonable. Later, Shen et al. modified Yang and Shieh's scheme to resist Chan and Cheng's attack. However, in this paper, we shall point out that Shen et al.'s improvement is still vulnerable to the forgery attack.