%0 Conference Proceedings %T Security Vulnerabilities of User Authentication Scheme Using Smart Card %+ Atal Bihari Vajpayee-Indian Institute of Information Technology and Management [Gwalior] (ABV-IIITM) %+ Defence Institute of Advanced Technology %A Pippal, Ravi, Singh %A C.D., Jaidhar %A Tapaswi, Shashikala %Z Part 4: Smart Cards Security (Short Papers) %< avec comité de lecture %( Lecture Notes in Computer Science %B 26th Conference on Data and Applications Security and Privacy (DBSec) %C Paris, France %Y Nora Cuppens-Boulahia %Y Frédéric Cuppens %Y Joaquin Garcia-Alfaro %I Springer %3 Data and Applications Security and Privacy XXVI %V LNCS-7371 %P 106-113 %8 2012-07-11 %D 2012 %R 10.1007/978-3-642-31540-4_8 %K Authentication %K Cryptanalysis %K Impersonation %K Password %K Smart card %Z Computer Science [cs]Conference papers %X With the exponential growth of Internet users, various business transactions take place over an insecure channel. To secure these transactions, authentication is the primary step that needs to be passed. To overcome the problems associated with traditional password based authentication methods, smart card authentication schemes have been widely used. However, most of these schemes are vulnerable to one or the other possible attack. Recently, Yang, Jiang and Yang proposed RSA based smart card authentication scheme. They claimed that their scheme provides security against replay attack, password guessing attack, insider attack and impersonation attack. This paper demonstrates that Yang et al.’s scheme is vulnerable to impersonation attack and fails to provide essential features to satisfy the needs of a user. Further, comparative study of existing schemes is also presented on the basis of various security features provided and vulnerabilities present in these schemes. %G English %Z TC 11 %Z WG 11.3 %2 https://inria.hal.science/hal-01534770/document %2 https://inria.hal.science/hal-01534770/file/978-3-642-31540-4_8_Chapter.pdf %L hal-01534770 %U https://inria.hal.science/hal-01534770 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-WG11-3 %~ IFIP-DBSEC %~ IFIP-LNCS-7371