Cryptology ePrint Archive: Report 2010/148

Comments on five smart card based password authentication protocols

Yalin Chen1, Jue-Sam Chou2,* , Chun-Hui Huang3

Abstract: In this paper, we use the ten security requirements proposed by Liao et al. for a smart card based authentication protocol to examine five recent work in this area. After analyses, we found that the protocols of Juang et al.’s, Hsiang et al.’s, Kim et al.’s, and Li et al.’s all suffer from the password guessing attack if the smart card is lost and the protocol of Xu et al.’s suffers from the insider attack.

Category / Keywords: cryptographic protocols / password authentication protocol, insider attack, smart card lost problem, password guessing attack

Date: received 19 Mar 2010

Contact author: jschou at mail nhu edu tw

Available format(s): PDF | BibTeX Citation

Version: 20100320:020118 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]