Title :
Cryptanalysis of “an improved timestamp-based remote user authentication scheme”
Author :
Kumari, Saru ; Gupta, Mridul K. ; Khan, Muhammad Khurram ; Muhaya, Fahad T Bin
Author_Institution :
Dept. of Math., Agra Coll., Agra, India
Abstract :
With the popularity of Internet technology, remote user authentication is receiving more and more attention than before. Recently, Awasthi et al. analysed weakness of the timestamp-based authentication scheme proposed by Shen et al. and proposed an improved scheme to prevent its forgery attacks. They claimed that their scheme is secure against forged login attack, provides forward secrecy, and has better performance than that of Shen et al.´s scheme without increasing any additional computations. In this paper, we show that the improved scheme proposed by Awasthi et al. is vulnerable to attacks like smart card loss attack, man-in-the-middle attack, ID-theft attack, etc. Further, we explain how their improved scheme inherits weakness from the original scheme and falls prey to some other attacks also.
Keywords :
Internet; cryptography; smart cards; ID-theft attack; Internet technology; cryptanalysis; forged login attack; forgery attacks; forward secrecy; improved timestamp-based remote user authentication scheme; man-in-the-middle attack; smart card loss attack; Authentication; Computer crime; Computers; Cryptography; Educational institutions; Smart cards; authentication; cryptanalysis; smart card; smart card loss; timestamp;
Conference_Titel :
Quality, Reliability, Risk, Maintenance, and Safety Engineering (ICQR2MSE), 2012 International Conference on
Conference_Location :
Chengdu
Print_ISBN :
978-1-4673-0786-4
DOI :
10.1109/ICQR2MSE.2012.6246494