Attacks on Shen et. al.’s remote user authentication scheme and defense*

The intent of this paper is to propose an efficient timestamp-based password authentication scheme using smart cards. We show various types of forgery attacks against Shen et. al.’s timestamp-based scheme and improve their scheme to ensure robust security for the remote authentication process keepin...

Full description

Bibliographic Details
Main Authors: Pathan, Al-Sakib Khan, Hong, Choong Seon
Format: Proceeding Paper
Language:English
Published: 2006
Subjects:
Online Access:http://irep.iium.edu.my/685/
http://irep.iium.edu.my/685/1/printversionspathanKIPS.pdf
_version_ 1848775742090903552
author Pathan, Al-Sakib Khan
Hong, Choong Seon
author_facet Pathan, Al-Sakib Khan
Hong, Choong Seon
author_sort Pathan, Al-Sakib Khan
building IIUM Repository
collection Online Access
description The intent of this paper is to propose an efficient timestamp-based password authentication scheme using smart cards. We show various types of forgery attacks against Shen et. al.’s timestamp-based scheme and improve their scheme to ensure robust security for the remote authentication process keeping almost all the advantages that were present in their scheme. Our scheme successfully defends the attacks that could be launched against other related previous schemes.
first_indexed 2025-11-14T14:19:01Z
format Proceeding Paper
id iium-685
institution International Islamic University Malaysia
institution_category Local University
language English
last_indexed 2025-11-14T14:19:01Z
publishDate 2006
recordtype eprints
repository_type Digital Repository
spelling iium-6852011-07-19T06:50:44Z http://irep.iium.edu.my/685/ Attacks on Shen et. al.’s remote user authentication scheme and defense* Pathan, Al-Sakib Khan Hong, Choong Seon TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices The intent of this paper is to propose an efficient timestamp-based password authentication scheme using smart cards. We show various types of forgery attacks against Shen et. al.’s timestamp-based scheme and improve their scheme to ensure robust security for the remote authentication process keeping almost all the advantages that were present in their scheme. Our scheme successfully defends the attacks that could be launched against other related previous schemes. 2006 Proceeding Paper PeerReviewed application/pdf en http://irep.iium.edu.my/685/1/printversionspathanKIPS.pdf Pathan, Al-Sakib Khan and Hong, Choong Seon (2006) Attacks on Shen et. al.’s remote user authentication scheme and defense*. In: The 26th KIPS Fall Conference 2006, November 10-11, 2006, Cheongju, Korea.
spellingShingle TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices
Pathan, Al-Sakib Khan
Hong, Choong Seon
Attacks on Shen et. al.’s remote user authentication scheme and defense*
title Attacks on Shen et. al.’s remote user authentication scheme and defense*
title_full Attacks on Shen et. al.’s remote user authentication scheme and defense*
title_fullStr Attacks on Shen et. al.’s remote user authentication scheme and defense*
title_full_unstemmed Attacks on Shen et. al.’s remote user authentication scheme and defense*
title_short Attacks on Shen et. al.’s remote user authentication scheme and defense*
title_sort attacks on shen et. al.’s remote user authentication scheme and defense*
topic TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices
url http://irep.iium.edu.my/685/
http://irep.iium.edu.my/685/1/printversionspathanKIPS.pdf