{"title":"Cryptanalysis of Yeh et al.'s timestamp based scheme using smart card","authors":"Chin-Ling Chen, Yong-Yuan Deng","doi":"10.1109/ICASI.2016.7539934","DOIUrl":null,"url":null,"abstract":"In 2010, Yeh et al. proposed a timestamp based scheme using smart cards. They claims that their schemes defended against ID-theft attacks, reply attacks, undetectable on-line password guessing attacks, off-line password guessing attacks, user impersonation attack, server counterfeit attack, and man-in-the-middle attack. In this paper, we show that Yeh et al.'s scheme is still vulnerable to ID-theft attack, off-line password guessing attacks and undetectable on-line password guessing attacks.","PeriodicalId":170124,"journal":{"name":"2016 International Conference on Applied System Innovation (ICASI)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Applied System Innovation (ICASI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICASI.2016.7539934","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In 2010, Yeh et al. proposed a timestamp based scheme using smart cards. They claims that their schemes defended against ID-theft attacks, reply attacks, undetectable on-line password guessing attacks, off-line password guessing attacks, user impersonation attack, server counterfeit attack, and man-in-the-middle attack. In this paper, we show that Yeh et al.'s scheme is still vulnerable to ID-theft attack, off-line password guessing attacks and undetectable on-line password guessing attacks.