Authentication and authenticated key exchanges
Designs, Codes and Cryptography
An attack on the Needham-Schroeder public-key authentication protocol
Information Processing Letters
Examining Smart-Card Security under the Threat of Power Analysis Attacks
IEEE Transactions on Computers
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Security enhancement for password authentication schemes with smart cards
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
A simple remote user authentication scheme
Mathematical and Computer Modelling: An International Journal
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
An efficient remote use authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Hi-index | 0.00 |
This paper discusses the security of Lee and Chiu’s remote user authentication scheme making use of smart cards. We first figure out that Lee and Chiu’s scheme does not achieve two-factor security. If an attacker steals some user’s smart card and extracts the information stored in the smart card, he/she can easily find out the user’s password. We show this by mounting an off-line dictionary attack on the scheme. In addition, we showed what really is causing the problem and how to fix it and proposed the scheme which improves on Lee and Chiu’s scheme.