Secure Remote Login Scheme with Password and Smart Card Update Facilities
Citations
77 citations
20 citations
14 citations
Cites background from "Secure Remote Login Scheme with Pas..."
...In 2016, Kumar et al.(34) proposed an improved password and smartcard based remote user authentication scheme which found to be susceptible to replay and session key disclosure attack....
[...]
...In 2016, Kumar et al.34 proposed an improved password and smartcard based remote user authentication scheme which found to be susceptible to replay and session key disclosure attack.35 Recently, in 2017, Li et al.36 proposed an ECC and biometric based authentication scheme for IoT environment but due to the use of biometric, the scheme becomes expensive....
[...]
14 citations
Cites background from "Secure Remote Login Scheme with Pas..."
...(14) Based on Equations (13) and (14), it is noticed that both the signatures ?...
[...]
...According to the successful forgery, knows (by assuming SKID∗A is the secret key of user having public key PKID∗A ) H∗ = [ SKID∗A(t ∗ + i) + SKID∗B ]2 s∗(t∗ + i) mod N. (18) Therefore, from Equations (17) and (18), realizes that[ SKID∗A(t ∗ + i) + SKID∗B ]2 s∗(t∗ + i) ≡ G + ( x∗i + v ∗ i ) U∗A (mod N)....
[...]
...Based on Equations (13) and (14), it is noticed that both the signatures ?̃?, generated by the signer S, and ?̂?, produced by the designated verifier V, are identical to each other....
[...]
...dn) = D̃, di = { mi ⊕ F [( s(t+i) N )] mi = 1 0 mi = 0 Z = SKIDS s mod N = Z̃ US = SK2 IDS mod N = ŨS W = H(M || US || IDV || Z) = W̃ ⎤⎥⎥⎥⎥⎥⎥⎥⎥⎥⎦ = 1 N4 (13)...
[...]
2 citations
Cites background from "Secure Remote Login Scheme with Pas..."
...Several mutual authentication techniques [4, 12,23, 24, 25] have been proposed in the literature....
[...]
References
6,757 citations
2,874 citations
"Secure Remote Login Scheme with Pas..." refers background in this paper
...first proposed by Lamport [24] based on the one-way hash function and thereafter many password-based authentication protocols [1, 2, 4, 6, 7, 10, 14–16, 18–21] have been proposed in the literature....
[...]
..., Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015, Advances in Intelligent Systems and Computing 404, DOI 10.1007/978-81-322-2695-6_41 495 first proposed by Lamport [24] based on the one-way hash function and thereafter many password-based authentication protocols [1, 2, 4, 6, 7, 10, 14–16, 18–21] have been proposed in the literature....
[...]
...Lamport, L.: Password authentication with insecure communication....
[...]
1,554 citations
296 citations
"Secure Remote Login Scheme with Pas..." refers background in this paper
...[29] illustrated that the schemes [27, 32] cannot withstand forgery attack, offline password guessing attack, and denial-of-service attack and presented better solutions to fix the problems....
[...]
...It has been observed that many schemes [17, 23, 27] suffer from smart card stolen attack resulting in offline password guessing....
[...]
260 citations
"Secure Remote Login Scheme with Pas..." refers background in this paper
...Resembling user impersonation attack [8], the attacker tries to impersonate as valid server after providing valid reply message ⟨Fi,Gi⟩ to the user, where Gi = Ri ⊕ Rrs, Fi = h(IDi ∥ Ri ∥ Rrs ∥ Regi)....
[...]