2015
DOI: 10.1007/s10916-015-0262-y
|View full text |Cite
|
Sign up to set email alerts
|

An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS

Abstract: Recently, Giri et al.'s proposed a RSA cryptosystem based remote user authentication scheme for telecare medical information system and claimed that the protocol is secure against all the relevant security attacks. However, we have scrutinized the Giri et al.'s protocol and pointed out that the protocol is not secure against off-line password guessing attack, privileged insider attack and also suffers from anonymity problem. Moreover, the extension of password guessing attack leads to more security weaknesses.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
58
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
7

Relationship

3
4

Authors

Journals

citations
Cited by 69 publications
(58 citation statements)
references
References 45 publications
0
58
0
Order By: Relevance
“…Let ⟨ ⟩ ← Reveal( 2 = ℎ( ‖ )) (12) if ( == ) then (13) Accept ID , ( ) , , as the correct ID , ( ), , , respectively. (14) return 0 (Success) (15) else (16) return 0 (Failure) (17) else (18) return 0 (Failure) (19) else (20) return 0 (Failure) (21) end if roles. The fundamental types available in the HLPSL are [46] as follows:…”
Section: Simulation Results Using Avispamentioning
confidence: 99%
See 1 more Smart Citation
“…Let ⟨ ⟩ ← Reveal( 2 = ℎ( ‖ )) (12) if ( == ) then (13) Accept ID , ( ) , , as the correct ID , ( ), , , respectively. (14) return 0 (Success) (15) else (16) return 0 (Failure) (17) else (18) return 0 (Failure) (19) else (20) return 0 (Failure) (21) end if roles. The fundamental types available in the HLPSL are [46] as follows:…”
Section: Simulation Results Using Avispamentioning
confidence: 99%
“…To design a secure authentication scheme, some cryptographic algorithms are also used, such as an RSA cryptosystem [14,15], elliptic curve cryptography [16,17], hash function [18,19], and chaos-based cryptography [20][21][22].…”
Section: Introductionmentioning
confidence: 99%
“…In the same year, Giri et al [8] proposed a robust authentication protocol using RSA and claimed that it is strongly protected against security vulnerabilities. But, Amin and Biswas [7] highlighted that the protocol in [8] is not secure against several security attacks. Further, they proposed a new protocol to overcome the security weaknesses.…”
Section: Literature Reviewsmentioning
confidence: 99%
“…In this regard, two-factor authentication protocols using smart-card and password are widely used and designing a robust and efficient two-factor authentication protocol is a critical task. The concept of client-server communication over insecure networks has been introduced for single server environment, and many researchers have proposed numerous authentication protocols [1][2][3] using hash function [4][5][6], RSA cryptosystem [7][8][9], elliptic curve [10], chaotic map [11,12], and bilinear pairing [13]. However, these protocols are unsuitable for multiserver communications.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation