Skip to main content
. 2015 Aug 11;10(8):e0131368. doi: 10.1371/journal.pone.0131368

Table 2. Login and Authentication phases of Wen’s scheme [3].

User Ui/Smartcard Server S
User Ui:
Insert ⟨ID i, PW i
Smartcard:
Select a random number r
Compute s 2 = H(H(PW i∣∣s 1), c i = c i + 1
Compute M 1 = (ID i∣∣N∣∣s 2∣∣r∣∣c i)2 mod n
(via a public channel)M1
Extract ⟨ID i, N, s 2, r, c i⟩ from M 1
Obtain ⟨ID i, ci from database
If (cici)
  abort the session
Else
 update ⟨ID i, ci to ⟨ID i, c i
Compute v = H(KID i), s2=Nv
If (s2s2)
  abort the session
Else
 authenticate U i
Compute the session key SK = H(s 2∣∣r∣∣1)
Compute M 2 = H(s 2∣∣r∣∣0)
(via a public channel)M2
Smartcard:
Compute M2 = H(s 2∣∣r∣∣0)
If (M2 M 2)
  abort the session
Else
 authenticate S
Compute the session key SK = H(s 2∣∣r∣∣1)