Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








492 Hits in 7.4 sec

Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards

Debiao He, Ding Wang, Shuhua Wu
2013 Information Technology and Control  
A x i i Y H ID p i PW i ID A S i U i U i U A A ID i PW S S A i U i p q H Y i x PW i i Y H ID p A i U A i i i i ID C V T i U i PW i i i Y Y H ID p i i C H ID p i i i D Y C p i i i i i i V H ID Y C D T A  ...  i PW i i i Y Y H ID p i i i D Y C p A i sk H D A x A i U A i i i i ID C V T i U i PW i i i Y Y H ID p i i C H ID p i i i D Y C p i i i i i i V H ID Y C D T Y H ID H PW r p i p q H Y i U i p q H Y i U  ... 
doi:10.5755/j01.itc.42.2.2554 fatcat:fabgctywfrffziu6shuq75tph4

Cryptanalysis of Improved Biometric-Based User Authentication Scheme for C/S System

Younsung Choi, Donghoon Lee, Jiye Kim, Jaewook Jung, Dongho Won
2015 International Journal of Information and Education Technology  
s scheme is vulnerable against server masquerading attack and stolen smart card attack. And also we show the possibility of authentication without login phase in Jiping et al.'  ...  In 2011, Das proposed a biometric-based authentication scheme, but it has various vulnerabilities such as replay attack, denial-of-service attack, user impersonation attack, and password change problem  ...  S SCHEME Cryptanalysis of Improved Biometric-Based User Authentication Scheme for C/S System Das proposed a biometric-based authentication scheme that has various security problems.  ... 
doi:10.7763/ijiet.2015.v5.564 fatcat:yiafpmjmevfp5dvpdvr3popm2m

Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards

Xiong Li, Jian-Wei Niu, Jian Ma, Wen-Dong Wang, Cheng-Lian Liu
2011 Journal of Network and Computer Applications  
Recently, Li and Hwang proposed a biometrics-based remote user authentication scheme using smart cards [Journal of Network and Computer Applications 33 (2010) 1-5].  ...  This paper proposes an improved biometrics-based remote user authentication scheme that removes the aforementioned weaknesses and supports session key agreement.  ...  In 2000, Hwang and Li (2000) proposed a remote user authentication scheme using smart cards based on ElGamal's (1985) public key cryptosystem. But there exist some security flaws in Hwang et al.'  ... 
doi:10.1016/j.jnca.2010.09.003 fatcat:zzrgz2w43farznthf3llxnqjfe

Cryptanalysis and Improvement of a Two-Factor User Authentication Scheme Providing Mutual Authentication and Key Agreement over Insecure Channels

Sajida Kalsoom, Sheikh Ziauddin
2013 International Journal of Machine Learning and Computing  
A two-factor remote authentication scheme was presented by Chun-Ta Li et al. in 2010. We present the framework of an impersonation attack against their scheme if the smart card gets stolen.  ...  We show that it is easy for an attacker to compute password of a user by using information extracted from the stolen smart card. We also propose a simple and easy solution to fix this problem.  ...  [6] presented a remote authentication protocol using password and smart card but Yoon et al.  ... 
doi:10.7763/ijmlc.2013.v3.348 fatcat:jqym2pdxhfcc7jyynrar5f3khu

Cryptanalysis of a Secure Remote User Authentication Scheme
안전한 원격사용자 인증스킴에 대한 취약성 분석

Jin Qiuyan, Kwang-Woo Lee, Dong-Ho Won
2012 The Journal of Korean Institute of Communications and Information Sciences  
Li et al. proposed a secure user authentication scheme, which is an improvement over Kim et al.'  ...  However, we found that their scheme is vulnerable to password guessing attack through password change phase, smart card forgery attack and stolen verifier attack. Moreover, C.-T. Li et al.'  ...  Introduction A remote user authentication mechanism is a procedure which using password and smart card to verify if the communication parties are trustable and legitimate.  ... 
doi:10.7840/kics.2012.37c.8.697 fatcat:rbp6jnngcvadxjvjwkmwe6ztwi

Cryptanalysis of Qu's improved smart card-based remote user authentication scheme

Eun-Jun Yoon
2014 Applied Mathematical Sciences  
s remote user authentication scheme is vulnerable to smart card loss attack, off-line password guessing attack and does not preserve anonymity of user.  ...  However, this paper points out that Qu's scheme is still vulnerable to off-line password guessing attack and smart card loss attack, and also does not preserve anonymity of a user unlike its claim.  ...  Introduction Smart card-based remote user authentication is a mechanism which allows the user and the server to mutually authenticate the legitimacy of each other over public network.  ... 
doi:10.12988/ams.2014.49731 fatcat:fxvyirdvs5cm7hx3sdu3z3isdm

Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards

Ashok Kumar Das
2011 International journal of network security and its applications  
Recently, Li et al. proposed a secure biometric-based remote user authentication scheme using smart cards to withstand the security flaws of Li-Hwang's efficient biometric-based remote user authentication  ...  a session key between the user and the server at the end of successful user authentication.  ...  ACKNOWLEDGEMENTS The author would like to thank the anonymous reviewers for their constructive suggestions and comments which have improved the content as well as presentation of this paper.  ... 
doi:10.5121/ijnsa.2011.3202 fatcat:x7p6r6mjjfedppqunwvjuums3i

Cryptanalysis of Goriparthi et al.'s Bilinear Pairing Based Remote User Authentication Scheme [chapter]

Hae-Jung Kim, Eun-Jun Yoon
2012 Lecture Notes in Computer Science  
In 2009, Goriparthi et al. proposed an improved bilinear pairing based remote user authentication scheme.  ...  However, this paper shows that the improved scheme is not only insecure against off-line password guessing, remote server impersonation, Denial of Service, and insider attacks, but also has mutual authentication  ...  We would like to thank the anonymous reviewers for their helpful comments in improving our manuscript. This study was supported by the Kyungil University Grant.  ... 
doi:10.1007/978-3-642-35606-3_69 fatcat:lhw5ikeorjc4ni47cmmmwyod24

Cryptanalysis and an Efficient Secure ID-based Remote User Authentication using Smart Card

Ruhul Amin
2013 International Journal of Computer Applications  
In 2012, Ratan-Sanjay [1] proposed secure ID based remote user authentication scheme using smart card and claimed that their scheme can avoid all types of security flaws and feasible in terms of computation  ...  Recently, many secure ID based remote user authentication scheme using smart card have been proposed in the literature.  ...  In addition, proposed scheme provides mutual authentication between user and remote server and also user can change his/her password freely without help of remote server.  ... 
doi:10.5120/13175-0909 fatcat:ulcx5ksys5eureduxie6j5u62u

Cryptanalysis of a New Dynamic ID-based User Authentication Scheme to Resist Smart-Card-Theft Attack

Fengtong Wen, Dianli Guo, Xuelei Li
2014 Applied Mathematics & Information Sciences  
In a recent paper (AMIS, 6(2S), 2012), Lee proposed a dynamic ID-based user authentication scheme based on smart card which is believed to have many abilities to resist a range of network attacks.  ...  the smart card.  ...  This work is supported by Natural Science Foundation of Shandong Province (NO. ZR2013FM009).  ... 
doi:10.12785/amis/080443 fatcat:admamdc6orfv3ndc6ukluu47ka

Cryptanalysis of Cryptanalysis and Improvement of Yan et al Biometric-Based Authentication Scheme for TMIS [article]

Mrudula Sarvabhatla, M.Giri, Chandra Sekhar Vorugunti
2014 arXiv   pre-print
In 2013, Yan proposed a biometric based remote user authentication scheme and claimed that his scheme is secure.  ...  Remote user authentication is critical requirement in Telecare Medicine Information System (TMIS) to protect the patient personal details, security and integrity of the critical medical records of the  ...  The smart card based authentication scheme pro-vides efficient solution for remote user authentication [6, 7] .  ... 
arXiv:1406.3943v1 fatcat:x2qgoto44vcdtnnbpg2sg6yr4y

Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'

Muhammad Khurram Khan, Soo-Kyun Kim, Khaled Alghathbar
2011 Computer Communications  
Recently, Wang et al. proposed a dynamic ID-based remote user authentication scheme using smart cards.  ...  Currently, smart card-based remote user authentication schemes have been widely adopted due to their low computational cost and convenient portability for the authentication purpose.  ...  s scheme, we propose an improved dynamic ID-based remote user authentication scheme which provides the missing security provisions that are necessary for a practical and real-life smart card-based authentication  ... 
doi:10.1016/j.comcom.2010.02.011 fatcat:n7zrtw7z7vbhbf5hsnprgj5trm

An Improved Remote User Authentication Scheme Using Smart Cards [article]

Manoj Kumar
2005 arXiv   pre-print
In 2000, Hwang and Li proposed a new remote user authentication scheme using smart cards.  ...  Further, in 2003, Shen, Lin and Hwang pointed out a different type of attack on Hwang and Li's scheme and presented a modified scheme to remove its security pitfalls.  ...  In 2000, Hwang and Li [16] proposed a new remote user authentication scheme using smart cards, which was based on ElGamal cryptosystem [22] .  ... 
arXiv:cs/0504076v1 fatcat:65urdmlehfaz5m626xba2mtr6i

Cryptanalysis of Wu and Xu's authentication scheme for Telecare Medicine Information Systems [article]

Dheerendra Mishra, Sourav Mukhopadhyay
2013 arXiv   pre-print
Remote user authentication is desirable for a Telecare medicine information system (TMIS) to verify the correctness of remote users.  ...  Moreover, we identify the inefficiency of incorrect input detection of the login phase in Wu and Xu's scheme, where the smart card executes the login session in-spite of wrong input.  ...  Although, password based authentication schemes provides efficient remote user authentication mechanism for TMIS, where user and server can mutually authenticate each other and establish a secure session  ... 
arXiv:1309.5255v1 fatcat:uez4a5c6yfe2nawxdbm3hn2htq

Cryptanalysis and Enhancement of a Remote User Authentication Scheme Using Smart Cards
스마트카드를 이용한 사용자 인증 스킴의 안전성 분석 및 개선

Young-Sook Lee, Dong-Ho Won
2010 Journal of the Korea Society of Computer and Information  
In 2005, Liao et al. proposed a remote user authentication scheme using a smart card, in which users can be authenticated anonymously.  ...  A remote user authentication scheme is a two-party protocol whereby an authentication server in a distributed system confirms the identity of a remote individual logging on to the server over an untrusted  ...  In a typical password-based authentication scheme using smart cards, remote users are authenticated using their smart card as an identification token; the smart card takes as input a password from a user  ... 
doi:10.9708/jksci.2010.15.1.139 fatcat:doavuh4z3jhqbcwmfwtpgjqduy
« Previous Showing results 1 — 15 out of 492 results