By Topic

Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Eun-Jun Yoon ; Daegu Polytech. Coll., Daegu ; Eun-Jung Lee ; Kee-Young Yoo

In 2004, both Ku et al. and Yoon et al. proposed remote user authentication scheme using smart cards, respectively. In 2007, Wang et al., however, showed that both Ku et al.'s scheme and Yoon et al.'s scheme are vulnerable to guessing attacks, forgery attacks and denied service attacks, as well as inefficiency in password authentication. Then, Wang et al. proposed an improvement on them to keep the merits of original schemes by using two-variant hashing operations. Nevertheless, this paper shows that Wang et al.'s scheme still does not provide perfect forward secrecy and is susceptible to a guessing attack and Denning-Sacco attack.

Published in:

Information Technology: New Generations, 2008. ITNG 2008. Fifth International Conference on

Date of Conference:

7-9 April 2008