Security Weaknesses of Li’s Remote User Password Authentication Scheme Using Smart Card
Authors
Jie Ling, Guang-Qiang Zhao, Yi Liu
Corresponding Author
Jie Ling
Available Online August 2015.
- DOI
- 10.2991/meita-15.2015.123How to use a DOI?
- Keywords
- Smart card, Impersonation attack, Anonymity, Clock synchronization.
- Abstract
User authentication is an important technology to guarantee that only the legal users can access resources from the remote server. The advantages of smart cards are storage and computation abilities. Recently, Li et al. pointed out the security problems of Chen et al’s password authentication scheme and they proposed an enhanced smart card based remote user password authentication scheme and claimed it is secure, However, We find that Li scheme is still vulnerable. It cannot resist user impersonation attack and insider attack. Besides, it also suffers from user anonymity violation and clock synchronization problem.
- Copyright
- © 2015, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Jie Ling AU - Guang-Qiang Zhao AU - Yi Liu PY - 2015/08 DA - 2015/08 TI - Security Weaknesses of Li’s Remote User Password Authentication Scheme Using Smart Card BT - Proceedings of the 2015 International Conference on Materials Engineering and Information Technology Applications PB - Atlantis Press SP - 677 EP - 681 SN - 2352-5401 UR - https://doi.org/10.2991/meita-15.2015.123 DO - 10.2991/meita-15.2015.123 ID - Ling2015/08 ER -