skip to main content
article

Remarks on fingerprint-based remote user authentication scheme using smart cards

Authors Info & Claims
Published:01 October 2004Publication History
Skip Abstract Section

Abstract

In 2002, Lee, Ryu, and Yoo proposed a fingerprint-based remote user authentication scheme using smart cards. The scheme makes it possible for authenticating the legitimacy of each login user without any password table. In addition, the authors claimed that the scheme can withstand message replay attack and impersonation. In this paper, we shall point out a security flaw in this scheme, that is, <i>n</i> legitimate users can conspire to forge 2<sup><i>n</i></sup>-<i>n</i>-1 valid IDs and PWs for successfully passing the system authentication. Furthermore, we also show that the authentication equation is incorrect. Thus, the scheme is unworkable.

References

  1. C. C. Chang, R. J. Hwang, and J. B. Daniel, "Using smart cards to authenticate passwords," in Proceedings of IEEE International Carnahan Conference on Security Technology, pp. 19--21, Ottawa, Canada, Oct. 1993.Google ScholarGoogle Scholar
  2. C. C. Chang and S. J. Hwang, "Using smart cards to authenticate remote passwords," Computers and Mathematics with Applications, vol. 26, no. 7, pp. 19--27, 1993.Google ScholarGoogle ScholarCross RefCross Ref
  3. C. C. Chang, S. M. Tsu, and C. Y. Chen, "Remote scheme for password authentication based on theory of quadratic residues," Computer Communications, vol. 18, no. 12, pp. 936--942, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. S. Hwang, "A remote password authentication scheme based on the digital signature method," International Journal of Computer Mathematics, vol. 70, no. 4, pp. 657--666, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  5. M. S. Hwang and L. H. Li, "A new remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 28--30, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. K. Lee, S. R. Ryu, and K. Y. Yoo, "Fingerprint-based remote user authentication scheme using smart card," Electronics Letters, vol. 38, no. 12, pp. 554--555, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  7. S. J. Wang and J. F. Chang, "Smart card based secure password authentication scheme," Computers & Security, vol. 15, no. 3, pp. 231--237, 1996.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. T. C. Wu, "Remote login authentication scheme based on a geometric approach," Computer Communications, vol. 18, no. 12, pp. 959--963, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. T. C. Wu and H. S. Sung, "Authentication passwords over an insecure channel," Computers & Security, vol. 15, no. 5, pp. 431--439, 1996.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Remarks on fingerprint-based remote user authentication scheme using smart cards
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGOPS Operating Systems Review
        ACM SIGOPS Operating Systems Review  Volume 38, Issue 4
        October 2004
        92 pages
        ISSN:0163-5980
        DOI:10.1145/1031154
        Issue’s Table of Contents

        Copyright © 2004 Authors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 October 2004

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader