<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article"><front><journal-meta><journal-id journal-id-type="publisher-id">INFORMATICA</journal-id><journal-title-group><journal-title>Informatica</journal-title></journal-title-group><issn pub-type="epub">0868-4952</issn><issn pub-type="ppub">0868-4952</issn><publisher><publisher-name>VU</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">inf14411</article-id><article-id pub-id-type="doi">10.15388/Informatica.2003.041</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research article</subject></subj-group></article-categories><title-group><article-title>Security of Improvement on Methods for Protecting Password Transmission</article-title></title-group><contrib-group><contrib contrib-type="Author"><name><surname>Yang</surname><given-names>Chou‐Chen</given-names></name><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><aff id="j_INFORMATICA_aff_000">Department of Management Information System, National Chung Hsing University, 250 Kuo Kuang Road, 402 Taichung, Taiwan, R.O.C.</aff></contrib-group><contrib-group><contrib contrib-type="Author"><name><surname>Chang</surname><given-names>Ting‐Yi</given-names></name><xref ref-type="aff" rid="j_INFORMATICA_aff_001"/></contrib><aff id="j_INFORMATICA_aff_001">Department of Computer and Information Science, National Chiao Tung University, 1001 Ta Hsueh Road, Hsinchu, Taiwan, R.O.C.</aff></contrib-group><contrib-group><contrib contrib-type="Author"><name><surname>Hwang</surname><given-names>Min‐Shiang</given-names></name><email xlink:href="mailto:mshwang@nchu.edu.tw">mshwang@nchu.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_002"/></contrib><aff id="j_INFORMATICA_aff_002">Department of Management Information System, National Chung Hsing University, 250 Kuo Kuang Road, 402 Taichung, Taiwan, R.O.C.</aff></contrib-group><pub-date pub-type="epub"><day>01</day><month>01</month><year>2003</year></pub-date><volume>14</volume><issue>4</issue><fpage>551</fpage><lpage>558</lpage><history><date date-type="received"><day>01</day><month>06</month><year>2003</year></date></history><abstract><p>Recently, Tseng et al. proposed an improvement on Peyravian and Zunic's protected password transmission scheme and protected changing scheme to remove some security flaws. However, as we will point out in this paper, any adversary can intercept the request for changing the password sent by a legal user and modify it with a wrong password. Furthermore, we shall also propose an improved version of their protected password changing scheme to help it out of the trouble.</p></abstract><kwd-group><label>Keywords</label><kwd>authentication</kwd><kwd>cryptography</kwd><kwd>discrete logarithm</kwd><kwd>password</kwd></kwd-group></article-meta></front></article>