• May 03, 2016 News! IJIET Vol. 5, No. 10 has been indexed by EI (Inspec).   [Click]
  • Sep 22, 2017 News!Vol. 7, No. 10 has been indexed by Crossref.
  • Sep 15, 2017 News!Vol. 7, No. 10 issue has been published online!   [Click]
General Information
    • ISSN: 2010-3689
    • Frequency: Bimonthly (2011-2014); Monthly (Since 2015)
    • DOI: 10.18178/IJIET
    • Editor-in-Chief: Prof. Dr. Steve Thatcher
    • Executive Editor: Ms. Nancy Y. Liu
    • Abstracting/ Indexing: EI (INSPEC, IET), Electronic Journals Library, Google Scholar, Crossref and ProQuest
    • E-mail: ijiet@ejournal.net
Editor-in-chief
Prof. Dr. Steve Thatcher
University of South Australia, Australia
It is my honor to be the editor-in-chief of IJIET. The journal publishes good papers which focous on the advanced researches in the field of information and education technology. Hopefully, IJIET will become a recognized journal among the scholars in the filed of information and education technology.
IJIET 2015 Vol.5(7): 553-556 ISSN: 2010-3689
DOI: 10.7763/IJIET.2015.V5.567

Security Weaknesses of a Timestamp-Based User Authentication Scheme with Smart Card

Jaewook Jung, Younsung Choi, Donghoon Lee, Jiye Kim, and Dongho Won
Abstract—Remote User authentication scheme is commonly used for communication between authorized remote users over insecure network. Due to its simplicity and convenience, it is widely used in many environments such as E-commerce or remote host login. In recent years, several remote user authentication schemes using smart card have been proposed. Recently, Huang et al. proposed a timestamp-based user authentication scheme with smart card. They claimed that their scheme can resist off-line password guessing attack. However, there is some vulnerability Huang et al.’s scheme that we find their scheme cannot resist the off-line password guessing attack and it cannot detect the wrong password in login phase, and also insecure for changing the user’s password in password change phase. In this paper, we conduct detailed analysis of flaws in Huang et al.’s scheme.

Index Terms—Remote user authentication scheme, smart card, password, security.

The authors are with the School of Information and Communication Engineering, Sungkyunkwan University, Korea (e-mail: jwjung@security.re.kr, yschoi@security.re.kr, dhlee@security.re.kr, jykim@security.re.kr, dhwon@security.re.kr).

[PDF]

Cite: Jaewook Jung, Younsung Choi, Donghoon Lee, Jiye Kim, and Dongho Won, "Security Weaknesses of a Timestamp-Based User Authentication Scheme with Smart Card," International Journal of Information and Education Technology vol. 5, no. 7, pp. 553-556, 2015.

Copyright © 2008-2017. International Journal of Information and Education Technology. All rights reserved.
E-mail: ijiet@ejournal.net