In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics and the smart card have been proposed in the literature. In 2012, Sonwanshi et al. proposed a password-based remote user authentication scheme using smart card, which uses the hash function and bitwise XOR operation. Their scheme is very efficient because of the usage of efficient one-way hash function and bitwise XOR operations. They claimed that their scheme is secure against several known attacks. Unfortunately, in this paper we find that their scheme has several vulnerabilities including the offline password guessing attack and stolen smart card attack. In addition, we show that their scheme fails to protect strong replay attack. © Springer-Verlag Berlin Heidelberg 2013.
CITATION STYLE
Das, A. K., Odelu, V., & Goswami, A. (2013). Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function. In Communications in Computer and Information Science (Vol. 377 CCIS, pp. 236–242). Springer Verlag. https://doi.org/10.1007/978-3-642-40576-1_23
Mendeley helps you to discover research relevant for your work.