Cryptanalysis of the Yeh-Sun password-based authentication protocols

Chris J. Mitchell and Qiang Tang

(2004)

Chris J. Mitchell and Qiang Tang (2004) Cryptanalysis of the Yeh-Sun password-based authentication protocols .

Our Full Text Deposits

Full text access: Open

Full Text - 87.18 KB

Links to Copies of this Item Held Elsewhere


Abstract

Two authentication protocols proposed by Yeh and Sun are analysed and shown to possess serious security defects.

Information about this Version

This is a Published version
This version's date is: 29/11/2004
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/7285a86c-2727-53f2-1d02-bf008fe91033/1/

Item TypeMonograph (Technical Report)
TitleCryptanalysis of the Yeh-Sun password-based authentication protocols
AuthorsMitchell, Chris J.
Qiang Tang, Qiang
DepartmentsFaculty of Science\Mathematics

Deposited by () on 14-Jul-2010 in Royal Holloway Research Online.Last modified on 10-Dec-2010

Notes

References

[1] D. E. Denning and G. M. Sacco. Timestamps in key distribution protocols.
Communications of the ACM, 24:533–536, 1981.

[2] H.-T. Yeh and H.-M. Sun. Password-based user authentication and key
distribution protocols for client-server applications. The Journal of Systems
and Software, 72:97–103, 2004.


Details