Security improvement of two dynamic ID-based authentication schemes by Sood-Sarje-Singh
Visualitza/Obre
Estadístiques de LA Referencia / Recolecta
Inclou dades d'ús des de 2022
Cita com:
hdl:2117/21130
Tipus de documentArticle
Data publicació2013
Condicions d'accésAccés obert
Llevat que s'hi indiqui el contrari, els
continguts d'aquesta obra estan subjectes a la llicència de Creative Commons
:
Reconeixement-NoComercial-SenseObraDerivada 3.0 Espanya
Abstract
In 2010, Sood-Sarje-Singh proposed two dynamic ID-based remote user authentication schemes. The first scheme
is a security improvement of Liao et al.’s scheme and the second scheme is a security improvement of Wang et
al.’s scheme. In both cases, the authors claimed that their schemes can resist many attacks. However, we find that
both schemes have security flaws. In addition, their schemes require a verification table and time-synchronization,
making the schemes unfeasible and unsecured for electronic services. In order to remedy the security flaws of
Sood et al.’s schemes, we propose a robust scheme which resists the well-known attacks and achieves all the
desirable security goals.
CitacióMartínez-Pelaez, R. [et al.]. Security improvement of two dynamic ID-based authentication schemes by Sood-Sarje-Singh. "Journal of Applied Research and Technology", 2013, vol. 11, núm. 5, p. 755-763.
ISSN1665-6423
Versió de l'editorhttp://www.jart.ccadet.unam.mx/jart/vol11_5/security_14.pdf
Fitxers | Descripció | Mida | Format | Visualitza |
---|---|---|---|---|
JART2013.pdf | Article principal | 238,9Kb | Visualitza/Obre |