Abstract

With the popularity of Internet technology, remote user authentication is receiving more and more attention than before. Recently, Awasthi et al. analysed weakness of the timestamp-based authentication scheme proposed by Shen et al. and proposed an improved scheme to prevent its forgery attacks. They claimed that their scheme is secure against forged login attack, provides forward secrecy, and has better performance than that of Shen et al.'s scheme without increasing any additional computations. In this paper, we show that the improved scheme proposed by Awasthi et al. is vulnerable to attacks like smart card loss attack, man-in-the-middle attack, ID-theft attack, etc. Further, we explain how their improved scheme inherits weakness from the original scheme and falls prey to some other attacks also.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call