Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints

  • Authors:
  • Michael Scott

  • Affiliations:
  • Dublin City University, Ballymun, Dublin, Ireland

  • Venue:
  • ACM SIGOPS Operating Systems Review
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

In a paper recently published in the ACM Operating Systems Review, Kim, Lee and Yoo [1] describe two ID-based password authentication schemes for logging onto a remote network server using smart cards, passwords and fingerprints. Various claims are made regarding the security of the schemes, but no proof is offered. Here we show how a passive eavesdropper, without access to any smart card, password or fingerprint, and after passively eavesdropping only one legitimate log-on, can subsequently log-on to the server claiming any identity.