Attacks on Shen et. al.’s remote user authentication scheme and defense*
The intent of this paper is to propose an efficient timestamp-based password authentication scheme using smart cards. We show various types of forgery attacks against Shen et. al.’s timestamp-based scheme and improve their scheme to ensure robust security for the remote authentication process keepin...
| Main Authors: | , |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2006
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/685/ http://irep.iium.edu.my/685/1/printversionspathanKIPS.pdf |
| _version_ | 1848775742090903552 |
|---|---|
| author | Pathan, Al-Sakib Khan Hong, Choong Seon |
| author_facet | Pathan, Al-Sakib Khan Hong, Choong Seon |
| author_sort | Pathan, Al-Sakib Khan |
| building | IIUM Repository |
| collection | Online Access |
| description | The intent of this paper is to propose an efficient timestamp-based password authentication scheme using smart cards. We show various types of forgery attacks against Shen et. al.’s timestamp-based scheme and improve their scheme to ensure robust security for the remote authentication process keeping almost all the advantages that were present in their scheme. Our scheme successfully defends the attacks that could be launched against other related previous schemes. |
| first_indexed | 2025-11-14T14:19:01Z |
| format | Proceeding Paper |
| id | iium-685 |
| institution | International Islamic University Malaysia |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-14T14:19:01Z |
| publishDate | 2006 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | iium-6852011-07-19T06:50:44Z http://irep.iium.edu.my/685/ Attacks on Shen et. al.’s remote user authentication scheme and defense* Pathan, Al-Sakib Khan Hong, Choong Seon TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices The intent of this paper is to propose an efficient timestamp-based password authentication scheme using smart cards. We show various types of forgery attacks against Shen et. al.’s timestamp-based scheme and improve their scheme to ensure robust security for the remote authentication process keeping almost all the advantages that were present in their scheme. Our scheme successfully defends the attacks that could be launched against other related previous schemes. 2006 Proceeding Paper PeerReviewed application/pdf en http://irep.iium.edu.my/685/1/printversionspathanKIPS.pdf Pathan, Al-Sakib Khan and Hong, Choong Seon (2006) Attacks on Shen et. al.’s remote user authentication scheme and defense*. In: The 26th KIPS Fall Conference 2006, November 10-11, 2006, Cheongju, Korea. |
| spellingShingle | TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices Pathan, Al-Sakib Khan Hong, Choong Seon Attacks on Shen et. al.’s remote user authentication scheme and defense* |
| title | Attacks on Shen et. al.’s remote user authentication scheme and defense* |
| title_full | Attacks on Shen et. al.’s remote user authentication scheme and defense* |
| title_fullStr | Attacks on Shen et. al.’s remote user authentication scheme and defense* |
| title_full_unstemmed | Attacks on Shen et. al.’s remote user authentication scheme and defense* |
| title_short | Attacks on Shen et. al.’s remote user authentication scheme and defense* |
| title_sort | attacks on shen et. al.’s remote user authentication scheme and defense* |
| topic | TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices |
| url | http://irep.iium.edu.my/685/ http://irep.iium.edu.my/685/1/printversionspathanKIPS.pdf |