Cryptanalysis of remote user authentication scheme with key agreement

dc.contributor.authorMadhusudan, R.
dc.contributor.authorValiveti, A.
dc.date.accessioned2020-03-30T10:02:31Z
dc.date.available2020-03-30T10:02:31Z
dc.date.issued2015
dc.description.abstractPassword authentication with smart card is one of the most convenient and effective two-factor authentication mechanisms for remote systems to assure one communicating party of the legitimacy of the corresponding party by acquisition of corroborative evidence. This technique has been widely deployed for various kinds of authentication applications, such as remote host login, online banking, e-commerce and e-health. Recently, Kumari et al. presented a dynamic-identity-based user authentication scheme with session key agreement. In this research, we illustrate that Kumari et al.'s scheme violates the purpose of dynamic-identity contrary to author's claim. We show that once the smart card of an arbitrary user is lost, messages of all registered users are at risk. Using information from an arbitrary smart card, an adversary can impersonate any user of the system. � 2015 IEEE.en_US
dc.identifier.citationI4CT 2015 - 2015 2nd International Conference on Computer, Communications, and Control Technology, Art Proceeding, 2015, Vol., , pp.476-480en_US
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/7582
dc.titleCryptanalysis of remote user authentication scheme with key agreementen_US
dc.typeBook chapteren_US

Files