<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article"><front><journal-meta><journal-id journal-id-type="publisher-id">INFORMATICA</journal-id><journal-title-group><journal-title>Informatica</journal-title></journal-title-group><issn pub-type="epub">0868-4952</issn><issn pub-type="ppub">0868-4952</issn><publisher><publisher-name>VU</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">INF12308</article-id><article-id pub-id-type="doi">10.3233/INF-2001-12308</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research article</subject></subj-group></article-categories><title-group><article-title>On the Security of Methods for Protecting Password Transmission<xref ref-type="fn" rid="fn1"><sup>✩</sup></xref></article-title></title-group><contrib-group><contrib contrib-type="Author"><name><surname>Tseng</surname><given-names>Yuh-Min</given-names></name><email xlink:href="mailto:tym@bear.nkjc.edu.tw">tym@bear.nkjc.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><contrib contrib-type="Author"><name><surname>Jan</surname><given-names>Jinn-Ke</given-names></name><xref ref-type="aff" rid="j_INFORMATICA_aff_001"/></contrib><contrib contrib-type="Author"><name><surname>Chien</surname><given-names>Hung-Yu</given-names></name><xref ref-type="aff" rid="j_INFORMATICA_aff_001"/></contrib><aff id="j_INFORMATICA_aff_000">Department of Information Management, Nan-Kai College of Technology and Commerce, Nantou, Taiwan 542, R.O.C</aff><aff id="j_INFORMATICA_aff_001">Institute of Applied Mathematics, National Chung Hsing University, Taichung, Taiwan 402, R.O.C.</aff></contrib-group><author-notes><fn id="fn1"><label><sup>✩</sup></label><p>This research was partially supported by National Science Council, Taiwan, R.O.C., under contract no. NSC89–2213-E-252–008.</p></fn></author-notes><pub-date pub-type="epub"><day>01</day><month>01</month><year>2001</year></pub-date><volume>12</volume><issue>3</issue><fpage>469</fpage><lpage>476</lpage><history><date date-type="received"><day>01</day><month>10</month><year>2000</year></date></history><abstract><p>Peyravian and Zunic (2000) proposed a password transmission scheme and a password change scheme over an insecure network. Their proposed solutions do not require the use of any symmetric-key or public-key cryptosystems. However, this article points out that their schemes have several security flaws for practical applications. A slight improvement on their schemes is proposed in this paper to remove the security flaws.</p></abstract><kwd-group><label>Keywords</label><kwd>cryptography</kwd><kwd>password</kwd><kwd>hash function</kwd><kwd>discrete logarithm</kwd></kwd-group></article-meta></front></article>