Security weaknesses of dynamic ID-based remote user authentication protocol

Hyoungseob Lee, Donghyun Choi, Yunho Lee, Dongho Won, Seung-Joo Kim

Research output: Contribution to journalArticle

10 Citations (Scopus)

Abstract

Recently, with the appearance of smart cards, many user authentication protocols using smart card have been proposed to mitigate the vulnerabilities in user authentication process. In 2004, Das et al. proposed a ID-based user authentication protocol that is secure against ID-theft and replay attack using smart card. In 2009, Wang et al. showed that Das et al.'s protocol is not secure to randomly chosen password attack and impersonation attack, and proposed an improved protocol. Their protocol provided mutual authentication and efficient password management. In this paper, we analyze the security weaknesses and point out the vulnerabilities of Wang et al.'s protocol.

Original languageEnglish
Pages (from-to)190-193
Number of pages4
JournalWorld Academy of Science, Engineering and Technology
Volume59
Publication statusPublished - 2009 Nov 1
Externally publishedYes

    Fingerprint

Keywords

  • Impersonation attack
  • Message alteration attack

ASJC Scopus subject areas

  • Engineering(all)

Cite this