By Topic

Further Cryptanalysis of 'A User Friendly Remote User Authentication Scheme with Smart Cards'

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Muhammad Khurram Khan ; Research Group for Biometrics & Security Engineering, Department of Computer Science & Engineering, Bahria University (Karachi Campus), 13-National Stadium Road, Karachi, Pakistan,

Recently, Wu and Chieu proposed 'a user friendly remote user authentication scheme with smart cards'. We point out that their scheme is vulnerable and susceptible to the attacks and can easily be cryptanalyzed. Their scheme provides only unilateral authentication (only client authentication) and there is no mutual authentication between user and remote system, so their scheme suscepts from the server spoofing attack. Their scheme also suffers from the impersonation attack and an adversary can easily impersonate a valid user. Furthermore, we describe that an adversary can login into the system by copying the data of stolen or lost smart card of a legitimate user. Moreover, we discuss that Wu and Chieu's scheme has poor reparability, which makes it infeasible to implement.

Published in:

Information and Emerging Technologies, 2007. ICIET 2007. International Conference on

Date of Conference:

6-7 July 2007