ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Secure Modification to Hsiang-SHIH’S Schema: A Case Study

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.3, No. 6)

Publication Date:

Authors : ;

Page : 455-459

Keywords : Smart Card; Cryptanalysis; authentication; Security.;

Source : Downloadexternal Find it from : Google Scholarexternal


The proposed schemes of Hsiang and Shih for the remote User authentication scheme using smart card they expropriate their schemes guarded against parallel session attack, and password guessing attacks, I, in this paper suggested that Hsiang and Shih’s schemes are still in jeopardy to off-line password guessing attacks and imperceptible to on-line password guessing attacks. The scenario will be same in which the user loss smart card as in the schemes of Hsian and shih’s. This proposal is a productive reconstruction and beat the security flaws in the Hsiang and Shih’s remote user authentication schemes using smart cards.

Last modified: 2014-07-04 21:06:39