Cryptanalysis of An Improved Timestamp-Based Remote User Authentication Scheme
With the popularity of Internet technology,remote user authentication is receiving more and more attention than before.Recently,Awasthi et al.analysed weakness of the timestamp-based authentication scheme proposed by Shen et al.and proposed an improved scheme to prevent its forgery attacks.They claimed that their scheme is secure against forged login attack,provides forward secrecy,and has better performance than that of Shen et al.’s scheme without increasing any additional computations.In this paper,we show that the improved scheme proposed by Awasthi et al.is vulnerable to attacks like smart card loss attack,man-in-the-middle attack,IDtheft attack,etc.Further,we explain how their improved scheme inherits weakness from the original scheme and falls prey to some other attacks also.
authentication cryptanalysis smart card loss timestamp smart card
Saru Kumari Mridul K. Gupta Muhammad Khurram Khan Fahad T. Bin Muhaya
Department of Mathematics Agra College Agra, Uttar Pradesh, India Department of Mathematics Chaudhary Charan Singh University Meerut, Uttar Pradesh, India Center of Excellence in Information Assurance,King Saud University,Kingdom of Saudi Arabia Department of Management Information System College of Business Administration King Saud University
国际会议
成都
英文
1445-1448
2012-06-15(万方平台首次上网日期,不代表论文的发表时间)