Improvement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance
نویسندگان
چکیده
Smart card-based user authentication is a useful mechanism for performing private session over an insecure network. Tang et al have proposed a robust and efficient scheme in 2013 that is based on elliptic curve discrete logarithm problem (ECDLP). It is for eliminating the attack in Awasthi et al’s scheme. However, Tang et al’s scheme is still vulnerable to denial of service attack and off-line password guessing attack. In this paper, the weakness of Tang et al’s scheme is presented. Furthermore, it gives the improvement of Tang et al’s scheme, and is proposed for avoiding the possible attack in Tang et al’s scheme.
منابع مشابه
A Robust and Efficient Timestamp-based Remote User Authentication Scheme with Smart Card Lost Attack Resistance
Password-based authentication scheme with smart card is an important part of security for accessing remote servers. In 2011, Awasthi et al. proposed an improved timestampbased remote user authentication scheme to eliminate the attacks in Shen et al.’s. However, we find that their scheme is vulnerable to the privileged insider, the lost smart card, the password guessing, the replay, the modifica...
متن کاملEnhancement of Timestamp-based User Authentication Scheme with Smart Card
User authentication is an important technology to guarantee that only the legal users can access resources from the remote server. The advantages of smart cards are storage and computation abilities. Recently, there are many remote user authentication protocols with smart card have been proposed to improve security, efficiency, and functionality extensively by many scholars. This article finds ...
متن کاملAttacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards
In 2003, Shen et al. proposed an improvement on YangShieh’s timestamp-based password authentication scheme using smart cards. Then they claimed that their scheme cannot withstand a forged login attack, but also eliminate a problem of Yang-Shieh’s. However, their scheme is still susceptible to forged login attack. In this letter, we show how the forged login attack can be worked out on Shen et a...
متن کاملA Novel Smart Card Authentication Scheme using Image Encryption
From the user point of view, security and efficiency are the two main factors for any authentication scheme. However, most of the smart card authentication schemes are vulnerable to one or the other possible attack. In this paper, highly secured smart card authentication scheme is proposed using image encryption that resists all the possible attacks and satisfies the needs of a user. Its securi...
متن کاملA Novel Smart Card Authentication Scheme using Image Watermarking
One of the primary issues of information technology and communication is the security of information from unwanted frauds. For every transaction over insecure channel authentication is required. Since the rise of the Internet smart card authentication schemes have been widely used to avoid the problems related to traditional password based authentication schemes. However, most of the smart card...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 17 شماره
صفحات -
تاریخ انتشار 2015