Authentication and authenticated key exchanges
Designs, Codes and Cryptography
An attack on the Needham-Schroeder public-key authentication protocol
Information Processing Letters
Password authentication with insecure communication
Communications of the ACM
Security enhancement for password authentication schemes with smart cards
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
An efficient remote use authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Improved efficient remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Vulnerabilities in a remote agent authentication scheme using smart cards
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
Hi-index | 0.00 |
Designing cryptographic protocols well suited for today's distributed large networks poses great challenges in terms of cost, performance, user convenience, functionality, and above all security As has been pointed out for many years, even designing a two-party authentication scheme is extremely error-prone This paper discusses the security of Lee et al.'s remote user authentication scheme making use of smart cards Lee et al.'s scheme was proposed to solve the security problem with Chien et al.'s authentication scheme and was claimed to provide mutual authentication between the server and the remote user However, we demonstrate that Lee et al.'s scheme only achieves unilateral authentication — only the server can authenticate the remote user, but not vice versa In addition, we recommend changes to the scheme that fix the security vulnerability.