Improvement of an Efficient and Practical Solution to Remote Authentication: Smart Card

نویسنده

  • Her-Tyan Yeh
چکیده

Recently, Chien et al. proposed an efficient timestampbased remote user authentication scheme using smart cards. The main merits include: (1) user-independent server, i.e., there is no password or verification table kept in the server; (2) users can freely choose their passwords; (3) mutual authentication is provided between the user and the server; and (4) lower communication and computation cost. In this paper, we show that Chien et al.’s scheme is insecure against forgery attack because one adversary can easily pretend to be a legal user, pass the server’s verification and login to the remote system successfully. An improved scheme is proposed that can overcome the security risk while still preserving all the above advantages. key words: remote authentication, smart card, network security, cryptography, data security

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication scheme

In an open network environment, the remote authentication scheme using smart cards is a very practical solution to validate the legitimacy of a remote user. In 2003, Wu and Chieu presented a user-friendly remote authentication scheme using smart cards. Recently, Wang, Li, and Tie found that Wu–Chieu s scheme is vulnerable to the forged login attack, and then presented an improvement to eliminat...

متن کامل

An Improvement of Efficient Dynamic ID-based User Authentication Scheme using Smart Cards without Verifier Tables

Remote user authentication scheme is one of the most convenient authentication schemes to deal with secret data over insecure channel. During the last couple of decades, many researchers have proposed a remote user authentication schemes which are ID-based, password-based, and smart card-based. Above all, smart card-based authentication schemes are becoming day by day more popular. One of the b...

متن کامل

An efficient remote use authentication scheme using smart cards

Based on the discrete logarithm problem, Hwaiig and Li [ 11 proposed a remote user authentication scheme using smart cards. In this paper, we fiirther propose an efficient and practical remote user authentication scheme using smart cards. The proposed scheme not only provides the same advantages as that of Hwang and Li's scheme, but also significantly reduces the communication and computation c...

متن کامل

Cryptanalysis and An Efficient Secure ID-Based Remote User Authentication Scheme Using Smart Card pdfkeywords=Attack, Authentication, Password, Secure ID, Smart Card

Remote User authentication protocol is used for verifying the legitimacy of a remote user over insecure network environments. Recently, many secure ID based remote user authentication scheme using smart card have been proposed in the literature. In 2012, Ratan-Sanjay [1] proposed secure ID based remote user authentication scheme using smart card and claimed that their scheme can avoid all types...

متن کامل

Improvement of Efficient and Secure Smart Card Based Password Authentication Scheme

Remote user authentication scheme is one of the most convenient authentication schemes to deal with secret data over public communication channel. In order to satisfy the security requirements, the smart card has become an essential device, one that is widely used. This is because its low computational cost and expedient portability. Recently, Liu et al. pointed out some security weaknesses in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEICE Transactions

دوره 89-B  شماره 

صفحات  -

تاریخ انتشار 2002