Cryptology ePrint Archive: Report 2010/148
Comments on five smart card based password authentication protocols
Yalin Chen, Jue-Sam Chou, Chun-Hui Huang
Abstract: In this paper, we use the ten security requirements proposed by Liao et al. for a smart card based authentication protocol to examine five recent work in this area. After analyses, we found that the protocols of Juang et al.’s, Hsiang et al.’s, Kim et al.’s, and Li et al.’s all suffer from the password guessing attack if the smart card is lost and the protocol of Xu et al.’s suffers from the insider attack.
Category / Keywords: cryptographic protocols / password authentication protocol, insider attack, smart card lost problem, password guessing attack
Date: received 19 Mar 2010
Contact author: jschou at mail nhu edu tw
Available format(s): PDF | BibTeX Citation
Version: 20100320:020118 (All versions of this report)
Short URL: ia.cr/2010/148
[ Cryptology ePrint archive ]