Smart card has been adopted to various applications. In 2000, Hwang and Li proposed a remote user authentication scheme, which is also using smart card. Nine months later, Chan and Cheng pointed out that there is a weakness in the remote authentication scheme proposed by Hwang and Li. In this paper, we show that Chan and Cheng's attack does not work well because they did not consider the format of user's identity. In addition, we propose several ways to solve the problem of Chan and Cheng's attack.
CITATION STYLE
Chang, C. C., & Hwang, K. F. (2003). Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards. Informatica, 14(3), 289–294. https://doi.org/10.15388/informatica.2003.022
Mendeley helps you to discover research relevant for your work.