Password authentication schemes allow a user or client to log into a remote server if the identity of the user or client is successfully authenticated by the system server. Authentication is done by supplying a correct password of the user to the server. Research on how one can protect the password from an adversary in such schemes have become more and more crucial in this era of technology. In 1999, Yang and Shieh proposed two password authentication schemes; timestamp-based and nonce-based schemes. However, in 2005, Kim et al. showed that these schemes are insecure and proposed an improvement. Later in 2009, Liu and Zhong successfully proved Kim’s improved version also to be insecure butsuggested no further improvement. In this paper, we improve Kim et al.’s timestamp-based scheme and show that the improved version is secure against attacks found by Kim et al. and Liu &Zhong.
Skip Nav Destination
Article navigation
28 June 2018
PROCEEDING OF THE 25TH NATIONAL SYMPOSIUM ON MATHEMATICAL SCIENCES (SKSM25): Mathematical Sciences as the Core of Intellectual Excellence
27–29 August 2017
Pahang, Malaysia
Research Article|
June 28 2018
Timestamp-based password authentication scheme
E. S. Ismail;
E. S. Ismail
a)
1
School of Mathematical Sciences, Faculty of Science and Technology, UniversitiKebangsaan Malaysia
, 43600 UKM Bangi, Selangor, Malaysia
a)Corresponding author:esbi@ukm.edu.my
Search for other works by this author on:
S. M. S. Syed-Musa
2
School of Mathematical Sciences, Faculty of Science and Technology, UniversitiKebangsaan Malaysia
, 43600 UKM Bangi, Selangor, Malaysia
Search for other works by this author on:
a)Corresponding author:esbi@ukm.edu.my
AIP Conf. Proc. 1974, 020051 (2018)
Citation
E. S. Ismail, S. M. S. Syed-Musa; Timestamp-based password authentication scheme. AIP Conf. Proc. 28 June 2018; 1974 (1): 020051. https://doi.org/10.1063/1.5041582
Download citation file:
Sign in
Don't already have an account? Register
Sign In
You could not be signed in. Please check your credentials and make sure you have an active account and try again.
Sign in via your Institution
Sign in via your InstitutionPay-Per-View Access
$40.00
24
Views
Citing articles via
Related Content
Two factor authentication in E-voting system using time based one time password
AIP Conference Proceedings (May 2023)
Password authentication scheme based on the quadratic residue problem
AIP Conference Proceedings (April 2017)
Timestamp boson sampling
Appl. Phys. Rev. (September 2022)
The use of graphical password to improve authentication problems in e-commerce
AIP Conf. Proc. (September 2018)
Analysis of password recovery schemes: Review
AIP Conference Proceedings (March 2023)