Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards

Password authentication is an important mechanism for remote login systems, where only authorized users can be authenticated via using their passwords and/or some similar secrets. In 1999, Yang and Shieh [14] proposed two password authentication schemes using smart cards. Their schemes are not only...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Wang, Guilin, Bao, Feng
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 409
container_issue
container_start_page 399
container_title
container_volume
creator Wang, Guilin
Bao, Feng
description Password authentication is an important mechanism for remote login systems, where only authorized users can be authenticated via using their passwords and/or some similar secrets. In 1999, Yang and Shieh [14] proposed two password authentication schemes using smart cards. Their schemes are not only very efficient, but also allow users to change their passwords freely and the server has no need to maintain a verification table for authenticating users. However, their schemes are later identified to be flawed. To overcome those security flaws, Shen et al. [9] and Yoon et al. [17] proposed further improvements and claimed their new schemes are secure. In this paper, we first point out that Yang et al.’s attack [15] against Shen et al.’s scheme is actually invalid, since we can show that in a real implementation it is extremely difficult to find two hash values such that one is divisible by the other. After that, we show that both of Shen et al.’ scheme and Yoon et al.’s scheme are insecure by identifying several effective impersonation attacks. Those attacks enable an outsider to be successfully authenticated and then enjoy the resources and/or services provided by the server.
doi_str_mv 10.1007/11935308_28
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_19183293</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>19183293</sourcerecordid><originalsourceid>FETCH-LOGICAL-p219t-3ca16f995020ef7fe3acd7907989a427eb1fdc67518e90e90971681ea2f1e26c3</originalsourceid><addsrcrecordid>eNpVkM1Lw0AUxNcvsNae_Af24sFD9L3dJJt31OAXFBTbnsPrZreNtknIRqT_vZF6UBiYw_wYhhHiAuEaAcwNIulEQ1ao7EBMyGQ6iSGmmIw-FCNMESOtYzr6l6XpsRiBBhWRifWpOAvhHQCUITUSb3m3a3uuebMLVZCNl_Nq60LP2za64-BK-cohfDVdKW8_-7Wr-8pyXzW1nNm1G0i5CFW9krMtd73MuSvDuTjxvAlu8utjsXi4n-dP0fTl8Tm_nUatQuojbRlTT5SAAueNd5ptaQgMZcSxMm6JvrSpSTBzBIPIYJqhY-XRqdTqsbjc97YcLG98x7WtQtF21bBlVyBhphXpgbvac2GI6pXrimXTfIQCofg5tfhzqv4G-O1kLw</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards</title><source>Springer Books</source><creator>Wang, Guilin ; Bao, Feng</creator><contributor>Ning, Peng ; Qing, Sihan ; Li, Ninghui</contributor><creatorcontrib>Wang, Guilin ; Bao, Feng ; Ning, Peng ; Qing, Sihan ; Li, Ninghui</creatorcontrib><description>Password authentication is an important mechanism for remote login systems, where only authorized users can be authenticated via using their passwords and/or some similar secrets. In 1999, Yang and Shieh [14] proposed two password authentication schemes using smart cards. Their schemes are not only very efficient, but also allow users to change their passwords freely and the server has no need to maintain a verification table for authenticating users. However, their schemes are later identified to be flawed. To overcome those security flaws, Shen et al. [9] and Yoon et al. [17] proposed further improvements and claimed their new schemes are secure. In this paper, we first point out that Yang et al.’s attack [15] against Shen et al.’s scheme is actually invalid, since we can show that in a real implementation it is extremely difficult to find two hash values such that one is divisible by the other. After that, we show that both of Shen et al.’ scheme and Yoon et al.’s scheme are insecure by identifying several effective impersonation attacks. Those attacks enable an outsider to be successfully authenticated and then enjoy the resources and/or services provided by the server.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540494966</identifier><identifier>ISBN: 3540494960</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540494973</identifier><identifier>EISBN: 3540494979</identifier><identifier>DOI: 10.1007/11935308_28</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; attack ; Computer science; control theory; systems ; Exact sciences and technology ; hash function ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; password authentication ; smart card ; Software</subject><ispartof>Information and Communications Security, 2006, p.399-409</ispartof><rights>Springer-Verlag Berlin Heidelberg 2006</rights><rights>2007 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11935308_28$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11935308_28$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4036,4037,27902,38232,41418,42487</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=19183293$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Ning, Peng</contributor><contributor>Qing, Sihan</contributor><contributor>Li, Ninghui</contributor><creatorcontrib>Wang, Guilin</creatorcontrib><creatorcontrib>Bao, Feng</creatorcontrib><title>Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards</title><title>Information and Communications Security</title><description>Password authentication is an important mechanism for remote login systems, where only authorized users can be authenticated via using their passwords and/or some similar secrets. In 1999, Yang and Shieh [14] proposed two password authentication schemes using smart cards. Their schemes are not only very efficient, but also allow users to change their passwords freely and the server has no need to maintain a verification table for authenticating users. However, their schemes are later identified to be flawed. To overcome those security flaws, Shen et al. [9] and Yoon et al. [17] proposed further improvements and claimed their new schemes are secure. In this paper, we first point out that Yang et al.’s attack [15] against Shen et al.’s scheme is actually invalid, since we can show that in a real implementation it is extremely difficult to find two hash values such that one is divisible by the other. After that, we show that both of Shen et al.’ scheme and Yoon et al.’s scheme are insecure by identifying several effective impersonation attacks. Those attacks enable an outsider to be successfully authenticated and then enjoy the resources and/or services provided by the server.</description><subject>Applied sciences</subject><subject>attack</subject><subject>Computer science; control theory; systems</subject><subject>Exact sciences and technology</subject><subject>hash function</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>password authentication</subject><subject>smart card</subject><subject>Software</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540494966</isbn><isbn>3540494960</isbn><isbn>9783540494973</isbn><isbn>3540494979</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpVkM1Lw0AUxNcvsNae_Af24sFD9L3dJJt31OAXFBTbnsPrZreNtknIRqT_vZF6UBiYw_wYhhHiAuEaAcwNIulEQ1ao7EBMyGQ6iSGmmIw-FCNMESOtYzr6l6XpsRiBBhWRifWpOAvhHQCUITUSb3m3a3uuebMLVZCNl_Nq60LP2za64-BK-cohfDVdKW8_-7Wr-8pyXzW1nNm1G0i5CFW9krMtd73MuSvDuTjxvAlu8utjsXi4n-dP0fTl8Tm_nUatQuojbRlTT5SAAueNd5ptaQgMZcSxMm6JvrSpSTBzBIPIYJqhY-XRqdTqsbjc97YcLG98x7WtQtF21bBlVyBhphXpgbvac2GI6pXrimXTfIQCofg5tfhzqv4G-O1kLw</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Wang, Guilin</creator><creator>Bao, Feng</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2006</creationdate><title>Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards</title><author>Wang, Guilin ; Bao, Feng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p219t-3ca16f995020ef7fe3acd7907989a427eb1fdc67518e90e90971681ea2f1e26c3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Applied sciences</topic><topic>attack</topic><topic>Computer science; control theory; systems</topic><topic>Exact sciences and technology</topic><topic>hash function</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>password authentication</topic><topic>smart card</topic><topic>Software</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wang, Guilin</creatorcontrib><creatorcontrib>Bao, Feng</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wang, Guilin</au><au>Bao, Feng</au><au>Ning, Peng</au><au>Qing, Sihan</au><au>Li, Ninghui</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards</atitle><btitle>Information and Communications Security</btitle><date>2006</date><risdate>2006</risdate><spage>399</spage><epage>409</epage><pages>399-409</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540494966</isbn><isbn>3540494960</isbn><eisbn>9783540494973</eisbn><eisbn>3540494979</eisbn><abstract>Password authentication is an important mechanism for remote login systems, where only authorized users can be authenticated via using their passwords and/or some similar secrets. In 1999, Yang and Shieh [14] proposed two password authentication schemes using smart cards. Their schemes are not only very efficient, but also allow users to change their passwords freely and the server has no need to maintain a verification table for authenticating users. However, their schemes are later identified to be flawed. To overcome those security flaws, Shen et al. [9] and Yoon et al. [17] proposed further improvements and claimed their new schemes are secure. In this paper, we first point out that Yang et al.’s attack [15] against Shen et al.’s scheme is actually invalid, since we can show that in a real implementation it is extremely difficult to find two hash values such that one is divisible by the other. After that, we show that both of Shen et al.’ scheme and Yoon et al.’s scheme are insecure by identifying several effective impersonation attacks. Those attacks enable an outsider to be successfully authenticated and then enjoy the resources and/or services provided by the server.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11935308_28</doi><tpages>11</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Information and Communications Security, 2006, p.399-409
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_19183293
source Springer Books
subjects Applied sciences
attack
Computer science
control theory
systems
Exact sciences and technology
hash function
Memory and file management (including protection and security)
Memory organisation. Data processing
password authentication
smart card
Software
title Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-01T20%3A35%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Cryptanalysis%20of%20Timestamp-Based%20Password%20Authentication%20Schemes%20Using%20Smart%20Cards&rft.btitle=Information%20and%20Communications%20Security&rft.au=Wang,%20Guilin&rft.date=2006&rft.spage=399&rft.epage=409&rft.pages=399-409&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540494966&rft.isbn_list=3540494960&rft_id=info:doi/10.1007/11935308_28&rft_dat=%3Cpascalfrancis_sprin%3E19183293%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540494973&rft.eisbn_list=3540494979&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true