Volume 33 Issue 05
May  2007
Turn off MathJax
Article Contents
Qi Wenhua, Zhang Qishan, Liu Jianweiet al. Enhancement of a timestamp-based password authentication scheme[J]. Journal of Beijing University of Aeronautics and Astronautics, 2007, 33(05): 577-579. (in Chinese)
Citation: Qi Wenhua, Zhang Qishan, Liu Jianweiet al. Enhancement of a timestamp-based password authentication scheme[J]. Journal of Beijing University of Aeronautics and Astronautics, 2007, 33(05): 577-579. (in Chinese)

Enhancement of a timestamp-based password authentication scheme

  • Received Date: 26 Jun 2006
  • Publish Date: 31 May 2007
  • Yang and Shieh have proposed a timestamp-based password authentication scheme using smart card. The weakness of Yang and Shieh-s scheme is submitting password in plaintext and not authenticating key information center(KIC)by user. The new scheme improved the process of registration, login, authentication and update password. The user submitted the password-s hash value instead of the password-s plaintext, and shared the secret information with the KIC. Submitting the password-s hash value is the same as password in authentication, and avoiding the password-s exposure. With the secret information, the user can authenticate the KIC. The new scheme can overcome all of the above vulnerabilities, can resist the forged login attack and never revel the privacy of user even if the server is attacked.

     

  • loading
  • [1] Yang W H, Shieh S P. Password authentication schemes with smart cards[J]. Computers & Security, 1999, 18(8):727-733 [2] Chan C K, Cheng L M. Cryptanalysis of a timestamp-based password authentication scheme[J].Computer & Security, 2002, 21(1):74-76 [3] Fan L, Li J H, Zhu H W. An enhancement of timestamp-based password authentication scheme[J]. Computer & Security, 2002, 21(7):655-667 [4] Wang Y J, Li J H. Security improvement on a timestamp-based password authentication scheme[J]. IEEE Transaction on Consumer Electronics, 2004, 50(2):580-582 [5] Ku W C, Chen S M. Weaknesses and improvements of an efficient password based user authentication scheme using smart cards[J]. IEEE Transaction on Consumer Electronics, 2004, 50(1):204-207 [6] Yoon E J, Ryu E K, Yoo K Y. Further improvement of an efficient password based remote user authentication scheme using smart cards[J]. IEEE Transaction on Consumer Electronics, 2004, 50(2):612-614 [7] Shieh W G, Wang J M. Efficient remote mutual authentication and key agreement[J]. Computers & Security, 2006,25(1):72-77
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(4140) PDF downloads(704) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return