Research Article
A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function
(1) Extract all the secret information from the memory of the stolen or lost smart | card of the user using the power analysis attacks [23, 24]. | (2) Call oracle on input in order to retrieve and as . | (3) Call oracle on input to retrieve , and as . | (4) if () and () then | (5) Accept as the correct password of the user . | (6) return 1 (Success) | (7) else | (8) return 0 (Failure) | (9) end if |
|