Secure Modification to Hsiang-SHIH’S Schema: A Case StudyJournal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.3, No. 6)
Publication Date: 2014-06-30
Authors : Mohd Yousuf;
Page : 455-459
Keywords : Smart Card; Cryptanalysis; authentication; Security.;
The proposed schemes of Hsiang and Shih for the remote User authentication scheme using smart card they expropriate their schemes guarded against parallel session attack, and password guessing attacks, I, in this paper suggested that Hsiang and Shih’s schemes are still in jeopardy to off-line password guessing attacks and imperceptible to on-line password guessing attacks. The scenario will be same in which the user loss smart card as in the schemes of Hsian and shih’s. This proposal is a productive reconstruction and beat the security flaws in the Hsiang and Shih’s remote user authentication schemes using smart cards.
Other Latest Articles
Last modified: 2014-07-04 21:06:39