TY - JOUR KW - Mutual Authentication KW - Remote Authentication KW - Smart Card KW - User Impersonation AU - Tzung-Her Chen AU - Du-Shiau Tsai AU - Gwoboa Horng AB -
Recently, Hwang and Li proposed a remote user authentication scheme that does not require a password table to verify the legitimacy of a legal user. This method uses smart cards. To benefit from this advantage, other research works have explored adding such features as reducing the computational cost, adopting user-friendly passwords, making it easier to change user passwords, etc. However, as cryptanalysis has evolved, a series of modifications that improve the known security flaws have been made subsequently. This article deals with a security problem found in a latest modification and improves it in order to construct a more secure function. The article also highlights a feature, mutual authentication between a server and users, found in many authentication protocols but seldom found in the considered series of modifications.
BT - Information & Security: An International Journal DA - 2006 DO - http://dx.doi.org/10.11610/isij.1806 LA - eng N2 -Recently, Hwang and Li proposed a remote user authentication scheme that does not require a password table to verify the legitimacy of a legal user. This method uses smart cards. To benefit from this advantage, other research works have explored adding such features as reducing the computational cost, adopting user-friendly passwords, making it easier to change user passwords, etc. However, as cryptanalysis has evolved, a series of modifications that improve the known security flaws have been made subsequently. This article deals with a security problem found in a latest modification and improves it in order to construct a more secure function. The article also highlights a feature, mutual authentication between a server and users, found in many authentication protocols but seldom found in the considered series of modifications.
PY - 2006 SP - 111 EP - 121 T2 - Information & Security: An International Journal TI - Secure User-Friendly Remote Authentication Schemes VL - 18 ER -