Password authentication with insecure communication
Communications of the ACM
Examining Smart-Card Security under the Threat of Power Analysis Attacks
IEEE Transactions on Computers
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
A password authentication scheme over insecure networks
Journal of Computer and System Sciences
More secure remote user authentication scheme
Computer Communications
An efficient biometrics-based remote user authentication scheme using smart cards
Journal of Network and Computer Applications
Secure password-based remote user authentication scheme with non-tamper resistant smart cards
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
A password authentication scheme against smart card security breach
ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
Hi-index | 0.00 |
Remote user authentication is important to identify whether communicating parties are genuine and trustworthy using the password and the smart card between a login user and a remote server. Recently, we find that Kim et al.'s password-based authentication scheme assume that the attacker cannot extract the secret information of the smart card. However, in reality, the authors in show that the secrets stored in the card can be extracted by monitoring its power consumption. Therefore, Kim et al.'s scheme fail to resist smart card security breach. As the main contribution of this paper, a robust remote user authentication scheme against smart card security breach is presented, while keeping the merits of the well-known smart card based authentication schemes.