%0 Journal Article
	%A Hyoungseob Lee and  Donghyun Choi and  Yunho Lee and  Dongho Won and  Seungjoo Kim
	%D 2009
	%J International Journal of Electrical and Computer Engineering
	%B World Academy of Science, Engineering and Technology
	%I Open Science Index 35, 2009
	%T Security Weaknesses of Dynamic ID-based Remote User Authentication Protocol
	%U https://publications.waset.org/pdf/1166
	%V 35
	%X Recently, with the appearance of smart cards, many
user authentication protocols using smart card have been proposed to
mitigate the vulnerabilities in user authentication process. In 2004,
Das et al. proposed a ID-based user authentication protocol that is
secure against ID-theft and replay attack using smart card. In 2009,
Wang et al. showed that Das et al.-s protocol is not secure to randomly
chosen password attack and impersonation attack, and proposed an
improved protocol. Their protocol provided mutual authentication and
efficient password management. In this paper, we analyze the security
weaknesses and point out the vulnerabilities of Wang et al.-s protocol.
	%P 1928 - 1931