﻿<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
			<journal-title-group>
				<journal-title>Informatica</journal-title>
			</journal-title-group>
			<issn pub-type="epub">1822-8844</issn>
			<issn pub-type="ppub">0868-4952</issn>
			<issn-l>0868-4952</issn-l>
			<publisher>
				<publisher-name>Vilnius University Institute of Mathematics and Informatics</publisher-name>
				<publisher-loc>Akademijos 4, LT-08663 Vilnius, Lithuania</publisher-loc>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="publisher-id">INFO581</article-id>
			<article-id pub-id-type="doi">10.15388/Informatica.2005.099</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Research Article</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>Attacks and Solutions of Yang <italic>et al.</italic>’s Protected Password Changing Scheme</article-title>
			</title-group>
			<contrib-group>
				<contrib contrib-type="author">
					<name>
						<surname>Yoon</surname>
						<given-names>Eun-Jun</given-names>
					</name>
					<email xlink:href="mailto:ejyoon@infosec.knu.ac.kr">ejyoon@infosec.knu.ac.kr</email>
					<xref ref-type="aff" rid="j_info581_aff_001"/>
				</contrib>
				<contrib contrib-type="author">
					<name>
						<surname>Ryu</surname>
						<given-names>Eun-Kyung</given-names>
					</name>
					<email xlink:href="mailto:ekryu@infosec.knu.ac.kr">ekryu@infosec.knu.ac.kr</email>
					<xref ref-type="aff" rid="j_info581_aff_001"/>
				</contrib>
				<contrib contrib-type="author">
					<name>
						<surname>Yoo</surname>
						<given-names>Kee-Young</given-names>
					</name>
					<email xlink:href="mailto:yook@knu.ac.kr">yook@knu.ac.kr</email>
					<xref ref-type="aff" rid="j_info581_aff_001"/>
				</contrib>
				<aff id="j_info581_aff_001">Department of Computer Engineering, <institution>Kyungpook National University</institution>, 1370 Sankyuk-dong, Buk-gu, Daegu 702-701, <country>South Korea</country>
				</aff>
			</contrib-group>
			<pub-date pub-type="ppub">
				<year>2005</year>
			</pub-date>
			<volume>16</volume>
			<issue>2</issue>
			<fpage>285</fpage>
			<lpage>294</lpage>
			<history>
				<date date-type="received">
					<day>1</day>
					<month>1</month>
					<year>2004</year>
				</date>
			</history>
			<permissions>
				<copyright-statement>© 2005 Institute of Mathematics and Informatics, Vilnius</copyright-statement>
				<copyright-year>2005</copyright-year>
				<license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0/">
					<license-p>Open access article under the <ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">CC BY</ext-link> license.</license-p>
				</license>
			</permissions>
			<abstract>
				<p>Recently, Yang <italic>et al.</italic> proposed an improvement to Tseng <italic>et al.</italic>’s protected password changing scheme that can withstand denial of service attack. However, the improved scheme is still susceptible to stolen-verifier attack and denial of service attack. Accordingly, the current paper demonstrates the vulnerability of Yang <italic>et al.</italic>’s scheme to two simple attacks and presents an improved protected password change scheme to resolve such problems. In contrast to Yang <italic>et al.</italic>’s protected password changing scheme and the existing password change schemes using server’s public key, the proposed scheme can securely update user passwords without a complicated process and server’s public key.</p>
			</abstract>
			<kwd-group>
				<label>Key words</label>
				<kwd>cryptography</kwd>
				<kwd>password</kwd>
				<kwd>authentication</kwd>
				<kwd>discrete logarithm</kwd>
				<kwd>hash function</kwd>
			</kwd-group>
		</article-meta>
	</front>
</article>