2012
DOI: 10.1002/dac.2368
|View full text |Cite
|
Sign up to set email alerts
|

Robust smart‐card‐based remote user password authentication scheme

Abstract: SUMMARYSmart‐card‐based remote user password authentication schemes are commonly used for providing authorized users a secure method for remotely accessing resources over insecure networks. In 2009, Xu et al. proposed a smart‐card‐based password authentication scheme. They claimed their scheme can withstand attacks when the information stored on the smart card is disclosed. Recently, Sood et al. and Song discovered that the smart‐card‐based password authentication scheme of Xu et al. is vulnerable to impersona… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
168
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 155 publications
(169 citation statements)
references
References 15 publications
1
168
0
Order By: Relevance
“…This work was an improvement over another such scheme by Chen et al [5]. We observe, that the clogging attack performed on the current protocol under consideration can also be performed on both the protocols [2] and [5]. Both the protocols are vulnerable because, the users smart card does not encrypt the message it sends over to the server for login and authentication.…”
Section: Clogging Attack Performed On Other Similar Schemesmentioning
confidence: 83%
“…This work was an improvement over another such scheme by Chen et al [5]. We observe, that the clogging attack performed on the current protocol under consideration can also be performed on both the protocols [2] and [5]. Both the protocols are vulnerable because, the users smart card does not encrypt the message it sends over to the server for login and authentication.…”
Section: Clogging Attack Performed On Other Similar Schemesmentioning
confidence: 83%
“…If there are hundreds of thousands of people in a wireless network environment, and each person's session key is different, managing the keys is not trivial. Table 2 shows a detailed description of the weaknesses of Li's scheme [18]. Table 2.…”
Section: Weaknesses Of Li's Schemementioning
confidence: 99%
“…Sandeep et al [32], in the same year, also proved that Xu et al 's scheme is not resistant to impersonation attack and offline dictionary attack and then devised a new enhanced one. Shortly after, however, Chen et al [33] found that both the schemes of Song and Stood et al are not secure: the scheme of Song cannot be resistant to smart card loss attack and offline dictionary attack; the scheme of Stood et al fails to achieve mutual authentication. So Chen et al designed an enhanced remote user authentication scheme.…”
Section: Introductionmentioning
confidence: 99%