Publication | Closed Access
Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards
113
Citations
0
References
2005
Year
Hardware SecurityLightweight Authentication MechanismAuthentication AuthorizationEngineeringInformation SecurityBiometricsIdentity-based SecurityId-theft AttackComputer ScienceLogin IdAuthentication Access ControlAuthentication ProtocolData SecurityCryptographyImpersonation Attack
Recently, Das et al. proposed a dynamic ID-based verifier-free password authentication scheme using smart cards. To resist the ID-theft attack, the user's login ID is dynamically generated and one-time used. Herein, we demonstrate that Das et al.'s scheme is vulnerable to an impersonation attack, in which the adversary can easily impersonate any user to login the server at any time. Furthermore, we also show several minor weaknesses of Das et al.'s scheme.