Improvement of One-Time Password Authentication Scheme Using Smart Cards
نویسندگان
چکیده
In 2002, Yeh, Shen, and Hwang proposed a one-time password authentication scheme using smart cards. However, Tsuji et al. and Ku et al. showed that it is vulnerable to the stolen verifier attack. Therefore, this paper proposes an improved one-time password authentication scheme, which not only keeps the security of the scheme of Yeh-Shen-Hwang but also can withstand the stolen verifier attack. key words: cryptography, security, one-time password, user authentication, smart card
منابع مشابه
Improvement of Li-Hwang’s Biometrics-based Remote User Authentication Scheme using Smart Cards
Recently, Li and Hwang proposed an efficient biometrics-based remote user authentication scheme without storing the password tables. Their scheme uses random numbers to solve the problem of synchronized clocks. It also enables the user to freely choose or change their passwords. At the same time, they claimed that their scheme provides security, reliability and efficiency. However, we found tha...
متن کاملOn the Remote Authentication with Self - Protected Smart Cards 植基於具自保功能智慧卡之遠端認證機制
Smart card is a secure device for remote authentication. However, if cardholders lost their card, attackers always can successfully guess passwords and impersonate legal users to login. In 2004, Lee et al. proposed a remote authentication scheme with smart cards. In this paper, we first show that their scheme cannot withstand the guessing attack. If attackers obtain the card, they can successfu...
متن کاملA Secure Remote Authentication Scheme Preserving User Anonymity with Non-Tamper Resistant Smart Cards
Anonymity is one of the important properties of remote authentication schemes to preserve user privacy. Besides, it can avoid unauthorized entities from using the user ID and other intercepted information to forge legal login messages. In 2004, Das et al. first proposed a remote user authentication scheme with smart cards using dynamic ID to protect user anonymity. Later, in 2005, Chien and Che...
متن کاملAn Improvement of Efficient Dynamic ID-based User Authentication Scheme using Smart Cards without Verifier Tables
Remote user authentication scheme is one of the most convenient authentication schemes to deal with secret data over insecure channel. During the last couple of decades, many researchers have proposed a remote user authentication schemes which are ID-based, password-based, and smart card-based. Above all, smart card-based authentication schemes are becoming day by day more popular. One of the b...
متن کاملA PingPong One-Time-Password system in Java application
The several techniques using technology based on biometrics, passwords, certificates, and smart cards can be used for user authentication in the accessible network system. One of the most popular areas in OTP authentication protocol can be used for authenticating a user by a server. It increases security by using a new password for each authentication while the previous password scheme iterativ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEICE Transactions
دوره 88-B شماره
صفحات -
تاریخ انتشار 2005