Security Vulnerabilities of User Authentication Scheme Using Smart Card - Data and Applications Security and Privacy XXVI Access content directly
Conference Papers Year : 2012

Security Vulnerabilities of User Authentication Scheme Using Smart Card

Abstract

With the exponential growth of Internet users, various business transactions take place over an insecure channel. To secure these transactions, authentication is the primary step that needs to be passed. To overcome the problems associated with traditional password based authentication methods, smart card authentication schemes have been widely used. However, most of these schemes are vulnerable to one or the other possible attack. Recently, Yang, Jiang and Yang proposed RSA based smart card authentication scheme. They claimed that their scheme provides security against replay attack, password guessing attack, insider attack and impersonation attack. This paper demonstrates that Yang et al.’s scheme is vulnerable to impersonation attack and fails to provide essential features to satisfy the needs of a user. Further, comparative study of existing schemes is also presented on the basis of various security features provided and vulnerabilities present in these schemes.
Fichier principal
Vignette du fichier
978-3-642-31540-4_8_Chapter.pdf (338.32 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-01534770 , version 1 (08-06-2017)

Licence

Attribution

Identifiers

Cite

Ravi Singh Pippal, Jaidhar C.D., Shashikala Tapaswi. Security Vulnerabilities of User Authentication Scheme Using Smart Card. 26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.106-113, ⟨10.1007/978-3-642-31540-4_8⟩. ⟨hal-01534770⟩
92 View
342 Download

Altmetric

Share

Gmail Facebook X LinkedIn More