<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article"><front><journal-meta><journal-id journal-id-type="publisher-id">INFORMATICA</journal-id><journal-title-group><journal-title>Informatica</journal-title></journal-title-group><issn pub-type="epub">0868-4952</issn><issn pub-type="ppub">0868-4952</issn><publisher><publisher-name>VU</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">inf14205</article-id><article-id pub-id-type="doi">10.15388/Informatica.2003.014</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research article</subject></subj-group></article-categories><title-group><article-title>On the Security of Some Password Authentication Protocols</article-title></title-group><contrib-group><contrib contrib-type="Author"><name><surname>Hsieh</surname><given-names>Bin‐Tsan</given-names></name><email xlink:href="mailto:bintsan@csi.ncku.edu.tw">bintsan@csi.ncku.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><aff id="j_INFORMATICA_aff_000">Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan, Taiwan 701</aff></contrib-group><contrib-group><contrib contrib-type="Author"><name><surname>Sun</surname><given-names>Hung‐Min</given-names></name><email xlink:href="mailto:hmsun@cs.nthu.edu.tw">hmsun@cs.nthu.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_001"/></contrib><aff id="j_INFORMATICA_aff_001">Department of Computer Science, National Cheng Kung University, Hsinchu, Taiwan 300</aff></contrib-group><contrib-group><contrib contrib-type="Author"><name><surname>Hwang</surname><given-names>Tzonelih</given-names></name><xref ref-type="aff" rid="j_INFORMATICA_aff_002"/></contrib><aff id="j_INFORMATICA_aff_002">Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan, Taiwan 701</aff></contrib-group><pub-date pub-type="epub"><day>01</day><month>01</month><year>2003</year></pub-date><volume>14</volume><issue>2</issue><fpage>195</fpage><lpage>204</lpage><history><date date-type="received"><day>01</day><month>11</month><year>2002</year></date></history><abstract><p>In an internet environment, such as UNIX, a remote user has to obtain the access right from a server before doing any job. The procedure of obtaining acess right is called a user authentication protocol. User authentication via user memorable password provides convenience without needing any auxiliary devices, such as smart card. A user authentication protocol via username and password should basically withstand the off‐line password guessing attack, the stolen verifier attack, and the DoS attack. Recently, Peyravian and Zunic proposed one password transmission protocol and one password change protocol. Later, Tseng et al. (2001) pointed out that Peyravian and Zunic's protocols can not withstand the off‐line password guessing attack, and therefore proposed an improved protocol to defeat the attack. Independently, Hwang and Yeh also showed that Peyravian and Zunic's protocols suffer from some secury flaws, and an improved protocol was also presented. In this paper, we show that both Peyravian and Zunic's protocols and Tseng et al.'s improved protocol are insecure against the stolen verifier attack. Moreover, we show that all Peyravian and Zunic's, Tseng et al.'s, and Hwang and Yeh's protocols are insecure against DoS attack.</p></abstract><kwd-group><label>Keywords</label><kwd>computer security</kwd><kwd>network security</kwd><kwd>protocol</kwd><kwd>cryptanalysis</kwd><kwd>password</kwd><kwd>authentication</kwd><kwd>hash function</kwd><kwd>cryptography</kwd></kwd-group></article-meta></front></article>