﻿<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
			<journal-title-group>
				<journal-title>Informatica</journal-title>
			</journal-title-group>
			<issn pub-type="epub">1822-8844</issn>
			<issn pub-type="ppub">0868-4952</issn>
			<issn-l>0868-4952</issn-l>
			<publisher>
				<publisher-name>Vilnius University Institute of Mathematics and Informatics</publisher-name>
				<publisher-loc>Akademijos 4, LT-08663 Vilnius, Lithuania</publisher-loc>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="publisher-id">INFO577</article-id>
			<article-id pub-id-type="doi">10.15388/Informatica.2005.094</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Research Article</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>Weaknesses and Improvements of Yang–Chang–Hwang’s Password Authentication Scheme</article-title>
			</title-group>
			<contrib-group>
				<contrib contrib-type="author">
					<name>
						<surname>Ku</surname>
						<given-names>Wei-Chi</given-names>
					</name>
					<email xlink:href="mailto:wcku@csie.fju.edu.tw">wcku@csie.fju.edu.tw</email>
					<xref ref-type="aff" rid="j_info577_aff_001"/>
				</contrib>
				<contrib contrib-type="author">
					<name>
						<surname>Tsai</surname>
						<given-names>Hao-Chuan</given-names>
					</name>
					<xref ref-type="aff" rid="j_info577_aff_001"/>
				</contrib>
				<aff id="j_info577_aff_001">Department of Computer Science and Information Engineering, <institution>Fu Jen Catholic University</institution>, 510 Chung Cheng Road, Hsinchuang, Taipei County, Taiwan 242, <country>R.O.C.</country>
				</aff>
			</contrib-group>
			<pub-date pub-type="ppub">
				<year>2005</year>
			</pub-date>
			<volume>16</volume>
			<issue>2</issue>
			<fpage>203</fpage>
			<lpage>212</lpage>
			<history>
				<date date-type="received">
					<day>1</day>
					<month>5</month>
					<year>2004</year>
				</date>
			</history>
			<permissions>
				<copyright-statement>© 2005 Institute of Mathematics and Informatics, Vilnius</copyright-statement>
				<copyright-year>2005</copyright-year>
				<license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0/">
					<license-p>Open access article under the <ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">CC BY</ext-link> license.</license-p>
				</license>
			</permissions>
			<abstract>
				<p>In 2001, Tseng, Jan, and Chien proposed an improved version of Peyravian–Zunic’s password authentication scheme based on the Diffie–Hellman scheme. Later, Yang, Chang, and Hwang demonstrated that Tseng–Jan–Chien’s scheme is vulnerable to a modification attack, and then described an improved scheme. In this paper, we show that Yang–Chang–Hwang’s scheme is still vulnerable to a denial-of-service attack and a stolen-verifier attack. In addition, we also propose an improved scheme with better security.</p>
			</abstract>
			<kwd-group>
				<label>Key words</label>
				<kwd>password authentication</kwd>
				<kwd>denial-of-service attack</kwd>
				<kwd>stolen-verifier attack</kwd>
			</kwd-group>
		</article-meta>
	</front>
</article>