A Novel Remote Login Authentication with Smart Card

Shoba Bindu C*, Chandra Sekhar Reddy P**, Satya Narayana B***
* Department of Computer Sclence & Engineering JNTUniverslty Collegeaf Engineering, Anantapur,A.P India.
** Professor Coardinafar,JNTUniversify College of Engineering, Hyderabad A.P India.
*** Department of Computer Science & Applications, SKUniversRy, Anantapur, A.P India.
Periodicity:October - December'2007
DOI : https://doi.org/10.26634/jse.2.2.545

Abstract

Sun proposed an efficient remote login authentication scheme based on one way hash function in 2000. In 2002, Chien et al. pointed out a deficiency of Sun’s scheme which only realized unilateral authentication and put forward an efficient and practical solution for remote mutual authentication scheme. But, recently Hsu discussed that this scheme was not secure enough since it was vulnerable to the parallel session attack again. In 2005, Liu et al. have proposed an enhancement to Chien et al. scheme. However, their scheme has many security flaws. This paper points out weaknesses of Liu et al. scheme and presents an enhancement to conquer the weaknesses.

Keywords

Masquerade Attack, Insider Attack, Password Guessing Attack, Time Concurrency, Password Change

How to Cite this Article?

Shoba Bindu C, Chandra Sekhar Reddy P and Satya Narayana B (2007). A Novel Remote Login Authentication with Smart Card. i-manager’s Journal on Software Engineering, 2(2), 22-27. https://doi.org/10.26634/jse.2.2.545

References

[ I ]. Junquing Liu, Jun Sun, Tianhao Li, "An Enhanced Remote Login Authentication with Smart Card", IEEE Transactions on consumer Electronics, SIPS 2005, pp, 229- 232,
[2]. H. Y. Chien, J. K. Jon, and Y. M. Tseng, "An Efficient and Practical Solution to Remote Authentication: Smart Card" , Computers & Security, Vol, 2 I {4) pp. 372-375, 2002.
[3]. C . L. Hsu, "Security of Two Remote User Authentication Schemes Using Smart Cards", IEEE Trans. On Consumer Electronics, Vol. 49, pp. I I 96- I I 98, 2003,
[4]. L.Lamport, "password authentication with insecure communication," Communications of the ACM, vol,24, no.1 I , pp. 770-772, I 981 . Authentication Technologies, Smartcards, Key.
[5]. R.C-W.Phan and B-M Goi, "Further Attacks and Comments on 'Security of Two Remote User Authentication Schemes Using Smart Cards," IEEE Trans. Consumer Electronics~, pp. 609-61 I , April 2004.
[6]. T.ElGamaI, "A Public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on informatlonTheory { I 985).
[7]. Y. Ding and R Horsier, "Undetectable on-line password guessing attacks," ACM Operating Systems Review, Vol, 29{4), pp. 77-86, 1995.
[8]. H. M. Sun, "An Efficient Remote User Authentication Scheme Using Smart Cards", IEEE Trans. on Cons. Elec., VoL 46, pp. 958- 96 I , 2000,
[9]. A. K. Awasthi and S. LaI, "A Remote User Authentication Scheme Using Smart Cards with Forward Secrecy" , IEEE Trans. On Consumer Electronics, 2003 .
[l0]. Ya-Fen Chang, Chien-Chen Chang, Yu-Wei Su, "A Secure improvement on the User.-Friendly Remote Authentication Scheme with no Time Concurrency Mechanism", Proceedings of the 20h International Conference on Advanced information Networking Applications(AINA'05).
[ I I ]. Eun-Jun Yoon, Kee-Young Yoo, "More Efficient and Secure Remote User Authentication Scheme Using Smart Cards", Proceedings of the 2005 11'h international Conference on Parallel and Distributed Systems (iCPADS'05).
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.