• DocumentCode
    2248448
  • Title

    Improvement upon Mutual Password Authentication Scheme

  • Author

    Zhu, Lu ; Yu, Sheng ; Zhang, Xing

  • Author_Institution
    Sch. of Comput., Wuhan Univ., Wuhan
  • Volume
    1
  • fYear
    2008
  • fDate
    19-19 Dec. 2008
  • Firstpage
    400
  • Lastpage
    403
  • Abstract
    Many password authentication schemes have been proposed for electronic commerce environment; however, none of them is secure enough. Hwang and Yeh proposed an improvement on the Peyravian-Zunic password authentication scheme including protected password transmission and password change. We demonstrate that the Hwang-Yeh scheme is also vulnerable to several kinds of attacks though the scheme has repaired some security problems of the Peyravianis-Zunic scheme. Furthermore, we propose an improved scheme to enhance security of their scheme in the paper. Based on collision-resistant hash function, the proposal employs techniques of salting, time stamp and trusted computing to be free from worries of possible common attacks, such as replay attack, guessing attack, stolen-verifier attack, denial of service attack, impersonation attack, and server spoofing attack. According to security analysis over insecure networks, the proposed scheme is the most secure scheme among the Peyravian-Zunic scheme, the Hwang-Yeh scheme, the Peyravian-Jeffries scheme, and the Wang-Zhang scheme.
  • Keywords
    cryptography; message authentication; Hwang-Yeh scheme; Peyravian-Zunic password authentication scheme; collision-resistant hash function; denial of service attack; electronic commerce environment; guessing attack; impersonation attack; insecure network; mutual password authentication scheme; password change; protected password transmission; secure scheme; security analysis; security problem; server spoofing attack; stolen-verifier attack; time stamp; Authentication; Computer crime; Data security; Electronic commerce; Information management; Proposals; Protection; Public key; Public key cryptography; Seminars; attack; authentication; hash function; password; secure; trusted computing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Business and Information Management, 2008. ISBIM '08. International Seminar on
  • Conference_Location
    Wuhan
  • Print_ISBN
    978-0-7695-3560-9
  • Type

    conf

  • DOI
    10.1109/ISBIM.2008.138
  • Filename
    5117512