Sciweavers

Share
INFORMATICALT
2007

A Secure YS-Like User Authentication Scheme

8 years 10 months ago
A Secure YS-Like User Authentication Scheme
Abstract. Recently, there are several articles proposed based on Yang and Shieh’s password authentication schemes (YS for short) with the following features: (1) A user can choose password freely. (2) The server does not need to maintain a password table. (3) There is no need to involve a trusted third party. Although there were several variants of the YS-like schemes claimed to address the forgery attacks, this paper analyzes their security and shows that they still suffer from forgery attacks. Furthermore, a new scheme based on the concept of message authentication is proposed to foil the forgery attack. Key words: remote user authentication, forgery attack, password, smart card, message authentication, mutual authentication.
Tzungher Chen, Gwoboa Horng, Ke-Chiang Wu
Added 15 Dec 2010
Updated 15 Dec 2010
Type Journal
Year 2007
Where INFORMATICALT
Authors Tzungher Chen, Gwoboa Horng, Ke-Chiang Wu
Comments (0)
books