The Community for Technology Leaders
2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE) (2014)
Oxford, United Kingdom
April 7, 2014 to April 11, 2014
ISBN: 978-1-4799-3616-8
pp: 474-477
ABSTRACT
Remote user authentication using smart cards is a method of verifying the legitimacy of remote users accessing the server through insecure channel, by using smart cards to increase the efficiency of the system. During last couple of years many protocols to authenticate remote users using smart cards have been proposed. But unfortunately, most of them are proved to be unsecure against various attacks. Recently this year, Yung-Cheng Lee improved Shin et al.'s protocol and claimed that their protocol is more secure. In this article, we have shown that Yung-Cheng-Lee's protocol too has defects. It does not provide user anonymity; it is vulnerable to Denial-of-Service attack, Session key reveal, user impersonation attack, Server impersonation attack and insider attacks. Further it is not efficient in password change phase since it requires communication with server and uses verification table.
INDEX TERMS
Servers, Protocols, Authentication, Smart cards, Cryptography, Bismuth
CITATION

R. Madhusudhan and R. K. S., "Cryptanalysis of a Remote User Authentication Protocol Using Smart Cards," 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE), Oxford, United Kingdom, 2014, pp. 474-477.
doi:10.1109/SOSE.2014.84
186 ms
(Ver 3.3 (11022016))