Proceedings of the 2015 International Conference on Materials Engineering and Information Technology Applications

Security Weaknesses of Li’s Remote User Password Authentication Scheme Using Smart Card

Authors
Jie Ling, Guang-Qiang Zhao, Yi Liu
Corresponding Author
Jie Ling
Available Online August 2015.
DOI
10.2991/meita-15.2015.123How to use a DOI?
Keywords
Smart card, Impersonation attack, Anonymity, Clock synchronization.
Abstract

User authentication is an important technology to guarantee that only the legal users can access resources from the remote server. The advantages of smart cards are storage and computation abilities. Recently, Li et al. pointed out the security problems of Chen et al’s password authentication scheme and they proposed an enhanced smart card based remote user password authentication scheme and claimed it is secure, However, We find that Li scheme is still vulnerable. It cannot resist user impersonation attack and insider attack. Besides, it also suffers from user anonymity violation and clock synchronization problem.

Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2015 International Conference on Materials Engineering and Information Technology Applications
Series
Advances in Engineering Research
Publication Date
August 2015
ISBN
10.2991/meita-15.2015.123
ISSN
2352-5401
DOI
10.2991/meita-15.2015.123How to use a DOI?
Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Jie Ling
AU  - Guang-Qiang Zhao
AU  - Yi Liu
PY  - 2015/08
DA  - 2015/08
TI  - Security Weaknesses of Li’s Remote User Password Authentication Scheme Using Smart Card
BT  - Proceedings of the 2015 International Conference on Materials Engineering and Information Technology Applications
PB  - Atlantis Press
SP  - 677
EP  - 681
SN  - 2352-5401
UR  - https://doi.org/10.2991/meita-15.2015.123
DO  - 10.2991/meita-15.2015.123
ID  - Ling2015/08
ER  -