Cryptanalysis of a Secure Remote User Authentication Scheme 


Vol. 37,  No. 8, pp. 697-702, Aug.  2012


PDF
  Abstract

In 2011, C.-T. Li et al. proposed a secure user authentication scheme, which is an improvement over Kim et al.’s scheme to resolve several security flaws such as off-line password guessing attack and masquerading attack. C.-T. Li et al. claimed that their scheme prevents smart card security related attacks. Moreover, it provides mutual authentication and session key establishment. However, we found that their scheme is vulnerable to password guessing attack through password change phase, smart card forgery attack and stolen verifier attack. Moreover, C.-T. Li et al.’s scheme is not secure against password guessing attack as they claimed. In this paper, we also point out that their scheme is not practical to use.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

J. Qiuyan, K. Lee, D. Won, "Cryptanalysis of a Secure Remote User Authentication Scheme," The Journal of Korean Institute of Communications and Information Sciences, vol. 37, no. 8, pp. 697-702, 2012. DOI: .

[ACM Style]

Jin Qiuyan, Kwangwoo Lee, and Dongho Won. 2012. Cryptanalysis of a Secure Remote User Authentication Scheme. The Journal of Korean Institute of Communications and Information Sciences, 37, 8, (2012), 697-702. DOI: .

[KICS Style]

Jin Qiuyan, Kwangwoo Lee, Dongho Won, "Cryptanalysis of a Secure Remote User Authentication Scheme," The Journal of Korean Institute of Communications and Information Sciences, vol. 37, no. 8, pp. 697-702, 8. 2012.