An improved timestamp-based remote user authentication scheme

  • Authors:
  • Amit K. Awasthi;Keerti Srivastava;R. C. Mittal

  • Affiliations:
  • Group for Cryptology Research, School of Vocational Studies and Applied Sciences, Gautam Buddha University, Greater Noida 201 308, India;Group for Cryptology Research, School of Vocational Studies and Applied Sciences, Gautam Buddha University, Greater Noida 201 308, India;Department of Mathematics, I.I.T. Roorkee, Roorkee 247 667, Uttarakhand, India

  • Venue:
  • Computers and Electrical Engineering
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

To protect the remote server from various malicious attacks, many authentication schemes have been proposed. Some schemes have to maintain a password verification table in the remote server for checking the legitimacy of the login users. To overcome potential risks of verification tables, researchers proposed remote user authentication schemes using smartcard, in which the remote server only keeps a secret key for computing the user's passwords and does not need any verification table for verifying legal user. In 2003 Shen, Lin, and Hwang proposed a timestamp-based password authentication scheme using smartcards in which the remote server does not need to store the passwords or verification table for user authentication. Unfortunately, this scheme is vulnerable to some deadly attacks. In this paper, we analyze few attacks and finally propose an improved timestamp-based remote user authentication scheme. The modified scheme is more efficient and secure than original scheme.