Home > Archive > 2013 > Volume 3 Number 5 (Oct. 2013) >
IJMLC 2013 Vol.3(5): 400-403 ISSN: 2010-3700
DOI: 10.7763/IJMLC.2013.V3.348

Cryptanalysis and Improvement of a Two-Factor User Authentication Scheme Providing Mutual Authentication and Key Agreement over Insecure Channels

Sajida Kalsoom and Sheikh Ziauddin

Abstract—A two-factor remote authentication scheme was presented by Chun-Ta Li et al. in 2010. We present the framework of an impersonation attack against their scheme if the smart card gets stolen. We show that it is easy for an attacker to compute password of a user by using information extracted from the stolen smart card. We also propose a simple and easy solution to fix this problem.

Index Terms—Authentication schemes, cryptanalysis, mutual authentication, smart card.

The authors are with the Department of Computer Science, COMSATS Institute of Information Technology, Islamabad, Pakistan (e-mail: sajida.kalsoom@gmail.com, sheikh.ziauddin@comsats.edu.pk ).

[PDF]

Cite:Sajida Kalsoom and Sheikh Ziauddin, "Cryptanalysis and Improvement of a Two-Factor User Authentication Scheme Providing Mutual Authentication and Key Agreement over Insecure Channels," International Journal of Machine Learning and Computing vol.3, no. 5, pp. 400-403, 2013.

General Information

  • E-ISSN: 2972-368X
  • Abbreviated Title: Int. J. Mach. Learn.
  • Frequency: Quaterly
  • DOI: 10.18178/IJML
  • Editor-in-Chief: Dr. Lin Huang
  • Executive Editor:  Ms. Cherry L. Chen
  • Abstracing/Indexing: Inspec (IET), Google Scholar, Crossref, ProQuest, Electronic Journals LibraryCNKI.
  • E-mail: ijml@ejournal.net


Article Metrics in Dimensions