Skip to Main content Skip to Navigation
Conference papers

Security Vulnerabilities of User Authentication Scheme Using Smart Card

Abstract : With the exponential growth of Internet users, various business transactions take place over an insecure channel. To secure these transactions, authentication is the primary step that needs to be passed. To overcome the problems associated with traditional password based authentication methods, smart card authentication schemes have been widely used. However, most of these schemes are vulnerable to one or the other possible attack. Recently, Yang, Jiang and Yang proposed RSA based smart card authentication scheme. They claimed that their scheme provides security against replay attack, password guessing attack, insider attack and impersonation attack. This paper demonstrates that Yang et al.’s scheme is vulnerable to impersonation attack and fails to provide essential features to satisfy the needs of a user. Further, comparative study of existing schemes is also presented on the basis of various security features provided and vulnerabilities present in these schemes.
Document type :
Conference papers
Complete list of metadata
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Thursday, June 8, 2017 - 11:06:35 AM
Last modification on : Thursday, February 7, 2019 - 4:49:44 PM
Long-term archiving on: : Saturday, September 9, 2017 - 12:39:32 PM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Ravi Singh Pippal, Jaidhar C.D., Shashikala Tapaswi. Security Vulnerabilities of User Authentication Scheme Using Smart Card. 26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.106-113, ⟨10.1007/978-3-642-31540-4_8⟩. ⟨hal-01534770⟩



Record views


Files downloads