Chris J. Mitchell and Qiang Tang (2004) Cryptanalysis of the Yeh-Sun password-based authentication protocols .
Full text access: Open
Two authentication protocols proposed by Yeh and Sun are analysed and shown to possess serious security defects.
This is a Published version This version's date is: 29/11/2004 This item is peer reviewed
https://repository.royalholloway.ac.uk/items/7285a86c-2727-53f2-1d02-bf008fe91033/1/
Deposited by () on 14-Jul-2010 in Royal Holloway Research Online.Last modified on 10-Dec-2010
[1] D. E. Denning and G. M. Sacco. Timestamps in key distribution protocols.Communications of the ACM, 24:533–536, 1981.[2] H.-T. Yeh and H.-M. Sun. Password-based user authentication and keydistribution protocols for client-server applications. The Journal of Systemsand Software, 72:97–103, 2004.