On the Security of a Novel Remote User Authentication Scheme using Smart Card based on ECDLP
نویسنده
چکیده
In 2009, Jena et al. proposed a novel remote user authentication scheme using smart card based on ECDLP and claimed that the proposed scheme withstands to security threats. This paper shows that Jena et al.’s scheme is vulnerable to serious security threats and also does not satisfy the attributes of an ideal password authentication scheme .
منابع مشابه
A Novel Remote User Authentication Scheme Using Smart Card with Biometric Based on Ecdlp
In this paper, a novel efficient remote user authentication scheme using smart card with biometric based on Elliptic Curve Discrete Logarithm Problem (ECDLP) has been proposed. A remote user authentication scheme is a client server based protocol whereby an authentication server identifies the identity of a remote user when he/she individually logging on to the server using public, untrusted, u...
متن کاملA Robust and Efficient Timestamp-based Remote User Authentication Scheme with Smart Card Lost Attack Resistance
Password-based authentication scheme with smart card is an important part of security for accessing remote servers. In 2011, Awasthi et al. proposed an improved timestampbased remote user authentication scheme to eliminate the attacks in Shen et al.’s. However, we find that their scheme is vulnerable to the privileged insider, the lost smart card, the password guessing, the replay, the modifica...
متن کاملImprovement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance
Smart card-based user authentication is a useful mechanism for performing private session over an insecure network. Tang et al have proposed a robust and efficient scheme in 2013 that is based on elliptic curve discrete logarithm problem (ECDLP). It is for eliminating the attack in Awasthi et al’s scheme. However, Tang et al’s scheme is still vulnerable to denial of service attack and off-line ...
متن کاملCryptanalysis and An Efficient Secure ID-Based Remote User Authentication Scheme Using Smart Card pdfkeywords=Attack, Authentication, Password, Secure ID, Smart Card
Remote User authentication protocol is used for verifying the legitimacy of a remote user over insecure network environments. Recently, many secure ID based remote user authentication scheme using smart card have been proposed in the literature. In 2012, Ratan-Sanjay [1] proposed secure ID based remote user authentication scheme using smart card and claimed that their scheme can avoid all types...
متن کاملAn Improvement of Efficient Dynamic ID-based User Authentication Scheme using Smart Cards without Verifier Tables
Remote user authentication scheme is one of the most convenient authentication schemes to deal with secret data over insecure channel. During the last couple of decades, many researchers have proposed a remote user authentication schemes which are ID-based, password-based, and smart card-based. Above all, smart card-based authentication schemes are becoming day by day more popular. One of the b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2010 شماره
صفحات -
تاریخ انتشار 2010