Encrypted remote user authentication scheme by using smart card
Ali A. Yassin,Hai Jin,Ayad Ibrahim,Deqing Zou
DOI: https://doi.org/10.1007/978-3-642-33469-6_42
2012-01-01
Abstract:Smart card-based authentication is considered as one of the most excessively used and applied solutions for remote user authentication. In this paper, we display Wang et al.'s scheme and indicate many shortcomings in their scheme. Password guessing, masquerade, Denial-Of-Service (DOS) and insider attacks could be effective. To outfight the drawbacks, we propose a strong, more secure and practical scheme, which is aimed to withstand well-known attacks. In addition, our proposed scheme provides many pivotal merits: more functions for security and effectiveness, mutual authentication, key agreement, freely chosen password, secure password change, and user anonymity. Moreover, our proposed scheme is shown to be secure against replay attack, password guessing attack, DOS attack, insider attack, and impersonate attack. Furthermore, the security analysis of our work gains it to appear in applications with high-security requirements.