Peyravian and Zunic (2000) presented two schemes for protecting password transmission and password change respectively. Like the traditional authentication scheme using passwords, the two new schemes are also vulnerable to attacks like guessing attacks, server spoofing, and server data eavesdropping. This paper will give demonstrations on what have caused to these drawbacks, and more of that, two improved schemes are also proposed which are free from worries of those possible attacks.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Jing-Jang HWANG, Tzu-Chang YEH, "Improvement on Peyravian-Zunic's Password Authentication Schemes" in IEICE TRANSACTIONS on Communications,
vol. E85-B, no. 4, pp. 823-825, April 2002, doi: .
Abstract: Peyravian and Zunic (2000) presented two schemes for protecting password transmission and password change respectively. Like the traditional authentication scheme using passwords, the two new schemes are also vulnerable to attacks like guessing attacks, server spoofing, and server data eavesdropping. This paper will give demonstrations on what have caused to these drawbacks, and more of that, two improved schemes are also proposed which are free from worries of those possible attacks.
URL: https://global.ieice.org/en_transactions/communications/10.1587/e85-b_4_823/_p
Copy
@ARTICLE{e85-b_4_823,
author={Jing-Jang HWANG, Tzu-Chang YEH, },
journal={IEICE TRANSACTIONS on Communications},
title={Improvement on Peyravian-Zunic's Password Authentication Schemes},
year={2002},
volume={E85-B},
number={4},
pages={823-825},
abstract={Peyravian and Zunic (2000) presented two schemes for protecting password transmission and password change respectively. Like the traditional authentication scheme using passwords, the two new schemes are also vulnerable to attacks like guessing attacks, server spoofing, and server data eavesdropping. This paper will give demonstrations on what have caused to these drawbacks, and more of that, two improved schemes are also proposed which are free from worries of those possible attacks.},
keywords={},
doi={},
ISSN={},
month={April},}
Copy
TY - JOUR
TI - Improvement on Peyravian-Zunic's Password Authentication Schemes
T2 - IEICE TRANSACTIONS on Communications
SP - 823
EP - 825
AU - Jing-Jang HWANG
AU - Tzu-Chang YEH
PY - 2002
DO -
JO - IEICE TRANSACTIONS on Communications
SN -
VL - E85-B
IS - 4
JA - IEICE TRANSACTIONS on Communications
Y1 - April 2002
AB - Peyravian and Zunic (2000) presented two schemes for protecting password transmission and password change respectively. Like the traditional authentication scheme using passwords, the two new schemes are also vulnerable to attacks like guessing attacks, server spoofing, and server data eavesdropping. This paper will give demonstrations on what have caused to these drawbacks, and more of that, two improved schemes are also proposed which are free from worries of those possible attacks.
ER -