A Remote Login Password Authentication Scheme Using Row Vector with Biometric

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 340)


Remote login authentication is very important to access resources from remote computers to control the illegal access. In this paper, we propose a remote login authentication scheme based on row vector theorems. In our scheme we use one way function to secure our message. In this scheme the system does not need to reconstruct any term of existing key table when a new user is inserted into a system. A legal user can freely choose and change his password using smart card. Our scheme is secure against different attacks like replay attack, forged login attack, password guessing attack.


Authentication Password Row vector Cross product Biometric 


  1. 1.
    Lamport, L.: Password authentication with in secure communication. Commun. ACM 24(11), 770–772 (1981)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Xu, J., Zhu, W.T., Feng, D.G.: An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4), 723–728 (2009)CrossRefGoogle Scholar
  3. 3.
    Song, R.: Advanced smart card based password authentication protocol. Comput. Stand. Interfaces 32(5), 321–325 (2010)CrossRefGoogle Scholar
  4. 4.
    Sood, S.K., Sarje, A.K., Singh, K.: An improvement of Xu et al.’s authentication scheme using smart cards. In: Proceedings of the Third Annual ACM Bangalore Conference, p. 15 (2010)Google Scholar
  5. 5.
    Chen, B.L., Kuo, W.C., Wuu, L.C.: Robust smart-card-based remote user password authentication scheme. Int. J. Commun. Syst. 27(2), 377–389 (2012)Google Scholar
  6. 6.
    Jiang, Q., Ma, J., Li, G., Li, X.: Improvement of robust smart-card-based password authentication scheme. Int. J. Commun. Syst. 28(2), 383–393 (2013)Google Scholar
  7. 7.
    Mishra, D., Chaturvedi, A., Mukhopadhyay, S.: Cryptanalysis and improvement of Jiang et al.’s smart card based remote user authentication scheme. CoRR (2013)Google Scholar
  8. 8.
    Khan, M.K., Zhang, J., Wang, X.: Chaotic hash based fingerprint biometric remote user authentication scheme on mobile devices. Chaos Solutions Fractals 35(3), 519–524 (2008)CrossRefGoogle Scholar
  9. 9.
    Chen, C.-L., Lee, C.-C., Hsu, C.-Y.: Mobile device integration of a fingerprint biometric remote authentication scheme. Int. J. Commun. Syst. 25(5), 585–597 (2012)Google Scholar
  10. 10.
    Truong, T.T., Tran, M.T., Duong, A.D.: Robust mobile device integration of a fingerprint biometric remote authentication scheme. In: Proceedings of 26th IEEE International Conference on Advanced Information Networking and Applications, pp. 678–685 (2012)Google Scholar
  11. 11.
    Khan, M.K., Kumari, S., Gupta, M.K., Muhaya, F.T.B.: Cryptanalysis of Truong et al.’s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device. Springer, Berlin, pp. 271–277 (2013)Google Scholar
  12. 12.
    Tan, K., Zhu, H.: Remote password authentication scheme based on cross-product. Comput. Commun. 22(4), 390–393 (1999)CrossRefGoogle Scholar
  13. 13.
    Chien, H.Y., Jan, J.K., Tseng, Y.M.: Impersonation attack on Tan-Zhu’s remote login scheme. Electron. Lett. 36(14), 1202–1203 (2000)CrossRefGoogle Scholar
  14. 14.
    Fan, C.-I., Wu, C.N., Chan, Y.C.: Cryptanalysis on Tan-Zhu remote password authentication scheme. Int. Math. Forum 1(28), 1383–1390 (2006)MathSciNetCrossRefMATHGoogle Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringIndian School of MinesDhanbadIndia

Personalised recommendations