A review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards

The intent of this paper is to review some timestampbased password authentication schemes using smart cards which have similar working principles. Many of the proposed timestampbased password authentication schemes were subsequently found to be insecure. Here, we investigate three schemes with simil...

Full description

Saved in:
Bibliographic Details
Main Author: Pathan, Al-Sakib Khan
Format: Article
Language:English
Published: Kohat University of Science and Technology (KUST), Pakistan 2010
Subjects:
Online Access:http://irep.iium.edu.my/802/1/5653-19903-1-PB.pdf
http://irep.iium.edu.my/802/
http://ijcnis.kust.edu.pk/article/view/5653
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
id my.iium.irep.802
record_format dspace
spelling my.iium.irep.8022011-08-05T01:22:05Z http://irep.iium.edu.my/802/ A review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards Pathan, Al-Sakib Khan TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices The intent of this paper is to review some timestampbased password authentication schemes using smart cards which have similar working principles. Many of the proposed timestampbased password authentication schemes were subsequently found to be insecure. Here, we investigate three schemes with similar working principles, show that they are vulnerable to tricky forgery attacks, and thus they fail to ensure the level of security that is needed for remote login procedure using smart cards. Though there are numerous works available in this field, to the best of our knowledge this is the first time we have found some critical flaws in these schemes that were not detected previously. Along with the proofs of their flaws and inefficiencies, we note down our solution which could surmount all sorts of known attacks and thus reduces the probability of intelligent forgery attacks. We provide a detailed literature review how the schemes have been developed and modified throughout years. We prove that some of the schemes which so far have been thought to be intractable are still flawed, in spite of their later improvements. Kohat University of Science and Technology (KUST), Pakistan 2010 Article REM application/pdf en http://irep.iium.edu.my/802/1/5653-19903-1-PB.pdf Pathan, Al-Sakib Khan (2010) A review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards. International Journal of Communication Networks and Information Security, 2 (1). pp. 15-20. ISSN 2073-607X (O), 2076-0930 (P) http://ijcnis.kust.edu.pk/article/view/5653
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices
spellingShingle TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices
Pathan, Al-Sakib Khan
A review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards
description The intent of this paper is to review some timestampbased password authentication schemes using smart cards which have similar working principles. Many of the proposed timestampbased password authentication schemes were subsequently found to be insecure. Here, we investigate three schemes with similar working principles, show that they are vulnerable to tricky forgery attacks, and thus they fail to ensure the level of security that is needed for remote login procedure using smart cards. Though there are numerous works available in this field, to the best of our knowledge this is the first time we have found some critical flaws in these schemes that were not detected previously. Along with the proofs of their flaws and inefficiencies, we note down our solution which could surmount all sorts of known attacks and thus reduces the probability of intelligent forgery attacks. We provide a detailed literature review how the schemes have been developed and modified throughout years. We prove that some of the schemes which so far have been thought to be intractable are still flawed, in spite of their later improvements.
format Article
author Pathan, Al-Sakib Khan
author_facet Pathan, Al-Sakib Khan
author_sort Pathan, Al-Sakib Khan
title A review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards
title_short A review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards
title_full A review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards
title_fullStr A review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards
title_full_unstemmed A review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards
title_sort review and cryptanalysis of similar timestamp-based password authentication schemes using smart cards
publisher Kohat University of Science and Technology (KUST), Pakistan
publishDate 2010
url http://irep.iium.edu.my/802/1/5653-19903-1-PB.pdf
http://irep.iium.edu.my/802/
http://ijcnis.kust.edu.pk/article/view/5653
_version_ 1643604673376026624