Secure Modification to Hsiang-SHIH’S Schema: A Case Study
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.3, No. 6)Publication Date: 2014-06-30
Authors : Mohd Yousuf;
Page : 455-459
Keywords : Smart Card; Cryptanalysis; authentication; Security.;
Abstract
The proposed schemes of Hsiang and Shih for the remote User authentication scheme using smart card they expropriate their schemes guarded against parallel session attack, and password guessing attacks, I, in this paper suggested that Hsiang and Shih’s schemes are still in jeopardy to off-line password guessing attacks and imperceptible to on-line password guessing attacks. The scenario will be same in which the user loss smart card as in the schemes of Hsian and shih’s. This proposal is a productive reconstruction and beat the security flaws in the Hsiang and Shih’s remote user authentication schemes using smart cards.
Other Latest Articles
- Use of Trypan blue-Arabinose System in Photogalvanic Cell for Solar Energy Conversion and Storage
- Template Based Abstractive Summarization of Twitter Topic with Speech Act
- A Review on Fatigue Life Prediction of a Heavy Vehicle Steel Wheel by using ?nite Element Analysis
- Production of Nanocopper by Electrodeposition Methods
- Comparative Adsorption of an Acid Dye with Different Activation of Fly Ash
Last modified: 2014-07-04 21:06:39