Comments on Five Smart Card Based Password Authentication Protocols

Yalin Chen, Jue-Sam Chou*, Chun-Hui Huang

In this paper, we use the ten security requirements proposed by Liao et al. for a smart card based authentication protocol to examine five recent work in this area. After analyses, we found that the protocols of Juang et al.'s , Hsiang et al.'s, Kim et al.'s, and Li et al.'s all suffer from offline password guessing attack if the smart card is lost, and the protocol of Xu et al.'s is subjected to an insider impersonation attack.

Knowledge Graph

arrow_drop_up

Comments

Sign up or login to leave a comment