International Journal of Network Security
Remote system authentication is a process by which a remote system gains confidence about the identity (or lo-gin request) of the communicating partner. Since the introduction of Lamport's scheme, several new proposals and improvements on remote systems authentication have been proposed. Recently, the researchers presented an paper by observing some flaws of their scheme and subsequently suggested two improved schemes. The basis of the their observation on their scheme was on this assumption: if an attacker steals a user's smart card and extracts the values stored in it through some means without being noticed, then the attacker can either masquerade as the user to forge a valid login request, or masquerade as the server to forge a valid reply message.