A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Weaknesses of a dynamic ID-based remote user authentication scheme
2010
International Journal of Electronic Security and Digital Forensics
The security of a password authentication scheme using smart cards proposed by Khan et al. is analyzed. Four kinds of attacks are presented in different scenarios. The analyses show that the scheme is insecure for practical application. * i J equals i J . But, in the registration phase, i J is not stored in the smart card. We think Khan et al.'s may make a mistake when design the registration phase and the password change phase. We demonstrate the drawbacks as follows. i J is not stored in
doi:10.1504/ijesdf.2010.038613
fatcat:uf2jjx3s2beefkcc6ydaf2nb7e