{"title":"对Wang等人的智能卡身份验证方案的改进","authors":"S. Sood, A. Sarje, Kuldip Singh","doi":"10.1109/NCC.2010.5430153","DOIUrl":null,"url":null,"abstract":"In 2009, Wang et al. argued that Das et al.'s scheme is vulnerable to stolen smart card attack if an attacker obtains the smart card of legitimate user and chooses any random password. Then the attacker gets through the authentication process to get access of the remote server. Therefore, Wang et al. proposed an improved scheme to preclude the weaknesses of Das et al.'s scheme. However, we found that Wang et al.'s scheme is vulnerable to impersonation attack, stolen smart card attack and offline password guessing attack. This paper improves Wang et al.'s scheme to resolve the aforementioned problems, while keeping the merits of different dynamic identity based authentication schemes.","PeriodicalId":130953,"journal":{"name":"2010 National Conference On Communications (NCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"25","resultStr":"{\"title\":\"An improvement of Wang et al.'s authentication scheme using smart cards\",\"authors\":\"S. Sood, A. Sarje, Kuldip Singh\",\"doi\":\"10.1109/NCC.2010.5430153\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In 2009, Wang et al. argued that Das et al.'s scheme is vulnerable to stolen smart card attack if an attacker obtains the smart card of legitimate user and chooses any random password. Then the attacker gets through the authentication process to get access of the remote server. Therefore, Wang et al. proposed an improved scheme to preclude the weaknesses of Das et al.'s scheme. However, we found that Wang et al.'s scheme is vulnerable to impersonation attack, stolen smart card attack and offline password guessing attack. This paper improves Wang et al.'s scheme to resolve the aforementioned problems, while keeping the merits of different dynamic identity based authentication schemes.\",\"PeriodicalId\":130953,\"journal\":{\"name\":\"2010 National Conference On Communications (NCC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-03-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"25\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 National Conference On Communications (NCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NCC.2010.5430153\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 National Conference On Communications (NCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCC.2010.5430153","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An improvement of Wang et al.'s authentication scheme using smart cards
In 2009, Wang et al. argued that Das et al.'s scheme is vulnerable to stolen smart card attack if an attacker obtains the smart card of legitimate user and chooses any random password. Then the attacker gets through the authentication process to get access of the remote server. Therefore, Wang et al. proposed an improved scheme to preclude the weaknesses of Das et al.'s scheme. However, we found that Wang et al.'s scheme is vulnerable to impersonation attack, stolen smart card attack and offline password guessing attack. This paper improves Wang et al.'s scheme to resolve the aforementioned problems, while keeping the merits of different dynamic identity based authentication schemes.