2013
DOI: 10.1002/dac.2590
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis and improvement of ‘a robust smart‐card‐based remote user password authentication scheme’

Abstract: SUMMARY With the use of smart card in user authentication mechanisms, the concept of two‐factor authentication came into existence. This was a forward move towards more secure and reliable user authentication systems. It elevated the security level by requiring a user to possess something in addition to know something. In 2010, Sood et al. and Song independently examined a smart‐card‐based authentication scheme proposed by Xu et al. They showed that in the scheme of Xu et al., an internal user of the system ca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
66
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 90 publications
(67 citation statements)
references
References 26 publications
(114 reference statements)
0
66
0
Order By: Relevance
“…So Chen et al designed an enhanced remote user authentication scheme. While this scheme was also proved by Kumari and Khan [34] it suffered from insider attack and impersonation attack. Li et al [35], in 2013, reanalyzed Chen et al 's scheme and then indicated that it cannot promise forward secrecy.…”
Section: Introductionmentioning
confidence: 90%
See 1 more Smart Citation
“…So Chen et al designed an enhanced remote user authentication scheme. While this scheme was also proved by Kumari and Khan [34] it suffered from insider attack and impersonation attack. Li et al [35], in 2013, reanalyzed Chen et al 's scheme and then indicated that it cannot promise forward secrecy.…”
Section: Introductionmentioning
confidence: 90%
“…In 2016, Kang et al [44] showed that Djellali et al 's scheme [45] suffers from offline dictionary attack, impersonation attack, and replay attack and then developed an enhanced scheme that achieves user anonymity with a Markov chain; and Kaul et al [46] also designed an improved authentication scheme based on Kumari et al 's scheme [34]. These schemes all claim to be resistant to various attacks, such as offline dictionary attack and impersonation attack.…”
Section: Our Contributionsmentioning
confidence: 99%
“…While cryptanalysis of Hao et al [12] scheme, we will follow the below mentioned well practiced techniques [29,30,31,32,33,34,35,36] in the literature:…”
Section: Assumptionsmentioning
confidence: 99%
“…Since then a considerable amount of research [1][2][3][4][5][6][7][8][9][10] has been carried out in this field. In 2009, Hsiang and Shih [1] showed that Liao-Wang [2] scheme cannot resist insider attack, masquerade attack, and server spoofing attack, meanwhile, the scheme cannot achieve mutual authentication.…”
Section: Introductionmentioning
confidence: 99%
“…Chen et al [5] proposed a robust smart-card based remote user password authentication scheme. Unfortunately, Saru et al [6] pointed out that Chen's scheme fails to resist impersonation attacks and insider attack and does not provide important features such as user anonymity, confidentiality to air messages. Later, Li et al [7] also showed that Chen et al's scheme cannot ensure forward secrecy and the password change phase of the scheme is unfriendly and inefficient when the users update their passwords, in order to eliminate these problems, they proposed a modified smart card based user authentication scheme and claim it is more secure.…”
Section: Introductionmentioning
confidence: 99%