• Corpus ID: 5657048

Security Analysis of a Remote User Authentication Scheme with Smart Cards

@article{Kumar2007SecurityAO,
  title={Security Analysis of a Remote User Authentication Scheme with Smart Cards},
  author={Manoj Kumar},
  journal={ArXiv},
  year={2007},
  volume={abs/0711.0128}
}
  • Manoj Kumar
  • Published 1 November 2007
  • Computer Science
  • ArXiv
Yoon et al. proposed a new efficient remote user authentication scheme using smart cards to solve the security problems of W. C. Ku and S. M. Chen scheme. This paper reviews Yoon et al. scheme and then proves that the password change phase of Yoon et al. scheme is still insecure. This paper also proves that the Yoon et al. is still vulnerable to parallel session attack. 
1 Citations
Remote User Authentication Schemes: A Review
To secure the resources or information from illegitimate users various kinds of authentication schemes have been designed and developed. Some of these schemes are vulnerable to a variety of attacks.

References

SHOWING 1-10 OF 37 REFERENCES
Security of Chien et al.'s remote user authentication scheme using smart cards
TLDR
It is demonstrated that Chien et al.'s scheme is vulnerable to the parallel session attack.
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
TLDR
The weaknesses of Chien et al.'s scheme are shown, and an improved scheme with better security strength is proposed, which is vulnerable to a reflection attack and an insider attack.
A new remote user authentication scheme using smart cards
TLDR
This work proposes a new remote user authentication scheme using smart cards based on the ElGamal's (1985) public key cryptosystem that can withstand message replaying attack.
Further improvement of an efficient password based remote user authentication scheme using smart cards
TLDR
An enhancement to Chien et al.'s scheme enables users to change their passwords freely and securely without the help of a remote server, while also providing secure mutual authentication.
Cryptanalysis of a Remote User Authentication Scheme Using Smart Cards
TLDR
This paper gives a cryptanalysis of the Liaw et al. remote user authentication scheme and presents that the scheme is vulnerable and insecure against at least four kinds of attack, including the offline password guessing attack, two impersonation attacks, the intruder-in-the-middle attack and the denial-of-service attack.
A flexible remote user authentication scheme using smart cards
TLDR
A simple and efficient remote user authentication scheme that allows users to freely choose and change their passwords without significantly increasing the computation cost is proposed.
A modified remote user authentication scheme using smart cards
TLDR
A different attack on Hwang-Li scheme is shown which is easier and simpler and an enhanced scheme for repairing the above attacks is presented.
A New Remote User Authentication Scheme Using Smart Cards with Forward Secrecy
  • Manoj Kumar
  • Computer Science
    IACR Cryptol. ePrint Arch.
  • 2004
TLDR
A new remote user authentication scheme with forward secrecy is presented, which provides forward secrecy to the long term secret key of the authentication server and is also secure against Chan – Cheng and all the extended attacks.
Some remarks on a remote user authentication scheme using smart cards with forward secrecy
  • Manoj Kumar
  • Computer Science
    IEEE Transactions on Consumer Electronics
  • 2004
TLDR
This paper analyses that Awasthi-Lal's paper suffers with some practical pitfalls and proposes a new scheme with forward secrecy, which is similar to Hwang-Li's scheme but without forward secrecy.
A simple remote user authentication scheme
TLDR
This scheme does not require any password or verification tables, and any legal users can arbitrarily choose and change their own passwords at will, and the password of a user is not revealed to the server.
...
1
2
3
4
...