Recently, Hwang and Yeh demonstrated that Peyravian-Zunic's password authentication scheme is vulnerable to several attacks, and then proposed a modified version. In this letter, we show that Hwang-Yeh's scheme still has several weaknesses and drawbacks.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Wei-Chi KU, Chien-Ming CHEN, Hui-Lung LEE, "Cryptanalysis of a Variant of Peyravian-Zunic's Password Authentication Scheme" in IEICE TRANSACTIONS on Communications,
vol. E86-B, no. 5, pp. 1682-1684, May 2003, doi: .
Abstract: Recently, Hwang and Yeh demonstrated that Peyravian-Zunic's password authentication scheme is vulnerable to several attacks, and then proposed a modified version. In this letter, we show that Hwang-Yeh's scheme still has several weaknesses and drawbacks.
URL: https://global.ieice.org/en_transactions/communications/10.1587/e86-b_5_1682/_p
Copy
@ARTICLE{e86-b_5_1682,
author={Wei-Chi KU, Chien-Ming CHEN, Hui-Lung LEE, },
journal={IEICE TRANSACTIONS on Communications},
title={Cryptanalysis of a Variant of Peyravian-Zunic's Password Authentication Scheme},
year={2003},
volume={E86-B},
number={5},
pages={1682-1684},
abstract={Recently, Hwang and Yeh demonstrated that Peyravian-Zunic's password authentication scheme is vulnerable to several attacks, and then proposed a modified version. In this letter, we show that Hwang-Yeh's scheme still has several weaknesses and drawbacks.},
keywords={},
doi={},
ISSN={},
month={May},}
Copy
TY - JOUR
TI - Cryptanalysis of a Variant of Peyravian-Zunic's Password Authentication Scheme
T2 - IEICE TRANSACTIONS on Communications
SP - 1682
EP - 1684
AU - Wei-Chi KU
AU - Chien-Ming CHEN
AU - Hui-Lung LEE
PY - 2003
DO -
JO - IEICE TRANSACTIONS on Communications
SN -
VL - E86-B
IS - 5
JA - IEICE TRANSACTIONS on Communications
Y1 - May 2003
AB - Recently, Hwang and Yeh demonstrated that Peyravian-Zunic's password authentication scheme is vulnerable to several attacks, and then proposed a modified version. In this letter, we show that Hwang-Yeh's scheme still has several weaknesses and drawbacks.
ER -