Loading…

Cryptanalysis and Improvement of a Two-Factor User Authentication Scheme Providing Mutual Authentication and Key Agreement over Insecure Channels

A two-factor remote authentication scheme was presented by Chun-Ta Li et al. in 2010. We present the framework of an impersonation attack against their scheme if the smart card gets stolen. We show that it is easy for an attacker to compute password of a user by using information extracted from the...

Full description

Saved in:
Bibliographic Details
Published in:International journal of machine learning and computing 2013-10, Vol.3 (5), p.400-403
Main Authors: Kalsoom, Sajida, Ziauddin, Sheikh
Format: Article
Language:English
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:A two-factor remote authentication scheme was presented by Chun-Ta Li et al. in 2010. We present the framework of an impersonation attack against their scheme if the smart card gets stolen. We show that it is easy for an attacker to compute password of a user by using information extracted from the stolen smart card. We also propose a simple and easy solution to fix this problem.
ISSN:2010-3700
2010-3700
DOI:10.7763/IJMLC.2013.V3.348