Title | ||
---|---|---|
Cryptanalysis of Two Efficient Password-based Authentication Schemes Using Smart Cards. |
Abstract | ||
---|---|---|
In 2011, Kumar et al. proposed an e‐cient password authentication scheme using smart cards to overcome the security ∞aws in Liao et al. scheme. However, in this paper, we point out that Kumar et al.’s scheme actually has various defects been overlooked, such as no provision of forward secrecy, poor repairability and practicality. More recently, Ramasamy and Muniyandi presented an e‐cient two-factor scheme based on RSA and this scheme is claimed to have a number of merits over existing schemes. Notwithstanding their ambitions, RamasamyMuniyandi’s scheme is vulnerable to user impersonation attack, and it actually is equivalent to a verifler-tablebased scheme, which discourages any use of the scheme for practical applications. |
Year | Venue | Field |
---|---|---|
2015 | I. J. Network Security | Authentication,Computer science,Computer security,Smart card,Cryptanalysis,Computer network,Forward secrecy,Password,Password authentication protocol,Impersonation attack |
DocType | Volume | Issue |
Journal | 17 | 6 |
Citations | PageRank | References |
0 | 0.34 | 36 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ying Wang | 1 | 13 | 1.22 |
Xinguang Peng | 2 | 0 | 1.69 |