Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function

5Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics and the smart card have been proposed in the literature. In 2012, Sonwanshi et al. proposed a password-based remote user authentication scheme using smart card, which uses the hash function and bitwise XOR operation. Their scheme is very efficient because of the usage of efficient one-way hash function and bitwise XOR operations. They claimed that their scheme is secure against several known attacks. Unfortunately, in this paper we find that their scheme has several vulnerabilities including the offline password guessing attack and stolen smart card attack. In addition, we show that their scheme fails to protect strong replay attack. © Springer-Verlag Berlin Heidelberg 2013.

Cite

CITATION STYLE

APA

Das, A. K., Odelu, V., & Goswami, A. (2013). Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function. In Communications in Computer and Information Science (Vol. 377 CCIS, pp. 236–242). Springer Verlag. https://doi.org/10.1007/978-3-642-40576-1_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free