Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards

In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme in an attempt to overcome the flaws of Yang-Shieh’s legendary timestamp-based remote authentication scheme using smart cards. After analyzing the improved scheme proposed by Yang-Wang-Chang, we have fo...

Full description

Bibliographic Details
Main Authors: Pathan, Al-Sakib Khan, Hong, Choong Seon
Format: Proceeding Paper
Language:English
Published: 2008
Subjects:
Online Access:http://irep.iium.edu.my/730/
http://irep.iium.edu.my/730/1/Cryptanalysis_of_Yang-Wang-Chang_s_Password_Authentication_Scheme_with_Smart_Cards.pdf
_version_ 1848775747376775168
author Pathan, Al-Sakib Khan
Hong, Choong Seon
author_facet Pathan, Al-Sakib Khan
Hong, Choong Seon
author_sort Pathan, Al-Sakib Khan
building IIUM Repository
collection Online Access
description In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme in an attempt to overcome the flaws of Yang-Shieh’s legendary timestamp-based remote authentication scheme using smart cards. After analyzing the improved scheme proposed by Yang-Wang-Chang, we have found that their scheme is still insecure and vulnerable to four types of forgery attacks. Hence, in this paper, we prove that, their claim that their scheme is intractable is incorrect. Also, we show that even an attack based on Sun et al.’s attack could be launched against their scheme which they claimed to resolve with their proposal.
first_indexed 2025-11-14T14:19:07Z
format Proceeding Paper
id iium-730
institution International Islamic University Malaysia
institution_category Local University
language English
last_indexed 2025-11-14T14:19:07Z
publishDate 2008
recordtype eprints
repository_type Digital Repository
spelling iium-7302011-08-02T07:35:42Z http://irep.iium.edu.my/730/ Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards Pathan, Al-Sakib Khan Hong, Choong Seon Q Science (General) QA76 Computer software In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme in an attempt to overcome the flaws of Yang-Shieh’s legendary timestamp-based remote authentication scheme using smart cards. After analyzing the improved scheme proposed by Yang-Wang-Chang, we have found that their scheme is still insecure and vulnerable to four types of forgery attacks. Hence, in this paper, we prove that, their claim that their scheme is intractable is incorrect. Also, we show that even an attack based on Sun et al.’s attack could be launched against their scheme which they claimed to resolve with their proposal. 2008 Proceeding Paper PeerReviewed application/pdf en http://irep.iium.edu.my/730/1/Cryptanalysis_of_Yang-Wang-Chang_s_Password_Authentication_Scheme_with_Smart_Cards.pdf Pathan, Al-Sakib Khan and Hong, Choong Seon (2008) Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards. In: 10th International Conference on Advanced Communication Technology (IEEE ICACT 2008), February 17-20, 2008, Phoenix Park, Korea. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4494091
spellingShingle Q Science (General)
QA76 Computer software
Pathan, Al-Sakib Khan
Hong, Choong Seon
Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards
title Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards
title_full Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards
title_fullStr Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards
title_full_unstemmed Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards
title_short Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards
title_sort cryptanalysis of yang-wang-chang’s password authentication scheme with smart cards
topic Q Science (General)
QA76 Computer software
url http://irep.iium.edu.my/730/
http://irep.iium.edu.my/730/
http://irep.iium.edu.my/730/1/Cryptanalysis_of_Yang-Wang-Chang_s_Password_Authentication_Scheme_with_Smart_Cards.pdf