Cryptanalysis of a remote user authentication protocol using smart cards

dc.contributor.authorMadhusudhan, R.
dc.contributor.authorKumar, R.S.
dc.date.accessioned2020-03-30T10:02:31Z
dc.date.available2020-03-30T10:02:31Z
dc.date.issued2014
dc.description.abstractRemote user authentication using smart cards is a method of verifying the legitimacy of remote users accessing the server through insecure channel, by using smart cards to increase the efficiency of the system. During last couple of years many protocols to authenticate remote users using smart cards have been proposed. But unfortunately, most of them are proved to be unsecure against various attacks. Recently this year, Yung-Cheng Lee improved Shin et al.'s protocol and claimed that their protocol is more secure. In this article, we have shown that Yung-Cheng-Lee's protocol too has defects. It does not provide user anonymity; it is vulnerable to Denial-of-Service attack, Session key reveal, user impersonation attack, Server impersonation attack and insider attacks. Further it is not efficient in password change phase since it requires communication with server and uses verification table. � 2014 IEEE.en_US
dc.identifier.citationProceedings - IEEE 8th International Symposium on Service Oriented System Engineering, SOSE 2014, 2014, Vol., , pp.474-477en_US
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/7581
dc.titleCryptanalysis of a remote user authentication protocol using smart cardsen_US
dc.typeBook chapteren_US

Files