Security Analysis on Remote User Authentication Methods

Remote user authentication has been framed to provide security to the users by hiding their details with the help of some technique which can bear all the forgery attacks, but not reveal any details. All the users want CIA (confidentiality, integrity, and availability) to be there if they are working in a network. Various protocols have been proposed and implemented in literature. But the efficient tool is still lacking. Here we find that many of the schemes and protocols suggested are vulnerable to forgery attacks. We have found some problems in secure remote user authentication scheme based on smart card.