An Improved Timestamp-Based Password Remote User Authentication Scheme
نویسندگان
چکیده
In 2003, Shen et al [4] proposed a timestamp-based password authentication scheme in which remote server does not need to store the passwords or verification table for users authentication. Unfortunately Wang and Li[6], E.J.Yoon [8], Lieu et al.[3], analyzed independently the Shen Lin Scheme [4] and was found to be vulnerable to some deadly attacks. In continuation to it, this paper analyzes few attacks and finally proposes an improved Timestampbased password remote user authentication scheme so that it can withstand the existing forged attacks.
منابع مشابه
A Robust and Efficient Timestamp-based Remote User Authentication Scheme with Smart Card Lost Attack Resistance
Password-based authentication scheme with smart card is an important part of security for accessing remote servers. In 2011, Awasthi et al. proposed an improved timestampbased remote user authentication scheme to eliminate the attacks in Shen et al.’s. However, we find that their scheme is vulnerable to the privileged insider, the lost smart card, the password guessing, the replay, the modifica...
متن کاملEnhancement of Timestamp-based User Authentication Scheme with Smart Card
User authentication is an important technology to guarantee that only the legal users can access resources from the remote server. The advantages of smart cards are storage and computation abilities. Recently, there are many remote user authentication protocols with smart card have been proposed to improve security, efficiency, and functionality extensively by many scholars. This article finds ...
متن کاملSecurity Analysis on a Timestamp-based Remote User Authentication Scheme
In recent years, many password-based remote user authentication schemes have been presented. In 2003, Shen et al. proposed a timestamp-based password authentication scheme using smart cards. In their scheme, the server does not need to maintain any verification table and only stores a secret key. However, Awasthi et al. found that Shen et al.’s scheme is vulnerable to impersonation attacks with...
متن کاملNew Time based User Security Scheme for Smart Cards
User Security is an important technology to guarantee that only the legal users can access resources from the remote server. The advantages of smart cards are storage and computation abilities. Recently, there are many remote user authentication protocols with smart card have been proposed to improve security, efficiency, and functionality extensively by many scholars. This article finds that R...
متن کاملAn Efficient Password Authentication Scheme for Smart Card
Yang-Wang-Chang proposed an improved timestamp associated password authentication scheme based on YangShieh, who had earlier proposed timestamp-based remote authentication scheme using smart cards. In this paper, we propose an efficient password authentication scheme with smart card applying RSA. The proposed scheme withstands most of the attacks with minimum computational cost.
متن کامل