2016
DOI: 10.1007/s13369-016-2341-x
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis and Extended Three-Factor Remote User Authentication Scheme in Multi-Server Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5

Relationship

3
2

Authors

Journals

citations
Cited by 28 publications
(13 citation statements)
references
References 33 publications
0
13
0
Order By: Relevance
“…To enhance the security, Mishra et al also devised a 3‐factor–based remote user authentication protocol. In recent times, many 3‐factor–based remote authentication schemes have been devised in the literature . But the bulk of remote user authentication schemes are unsafe against various security threats.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…To enhance the security, Mishra et al also devised a 3‐factor–based remote user authentication protocol. In recent times, many 3‐factor–based remote authentication schemes have been devised in the literature . But the bulk of remote user authentication schemes are unsafe against various security threats.…”
Section: Related Workmentioning
confidence: 99%
“… scriptA can obstruct the public messages over an unreliable channel, and then she/he can easily alter, replay, or delete these messages. scriptA cannot eavesdrop or intercept any communication message over a reliable channel. An attacker/adversary acts as a genuine user or vice versa. A server insider can reveal the privileged information of the server to scriptA or can himself behave as scriptA. scriptA can easily guess a low‐entropy identity or password individually, but the polynomial equation rule is violated for guessing 2 confidential data (password and identity) at the same time. If the length of identity I D i and password P W i are n characters each, then the guessing probability of an n ‐character‐long string is approximately 1/2 6 n All the protocols are publicly known in an authentication system. …”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…[5][6][7][8][9] In a single-server environment, for accessing different servers, one needs to remember many pairs of different secret pieces of information (e.g., user identity and password), which is the main issue in such environment. In order to overcome this limitation, various authentication schemes for multiserver environments have been designed, 4,[10][11][12][13][14][15] where one can access numerous application servers without separately registering at each and every server.…”
Section: Introductionmentioning
confidence: 99%