<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article"><front><journal-meta><journal-id journal-id-type="publisher-id">INFORMATICA</journal-id><journal-title-group><journal-title>Informatica</journal-title></journal-title-group><issn pub-type="epub">0868-4952</issn><issn pub-type="ppub">0868-4952</issn><publisher><publisher-name>VU</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">inf14302</article-id><article-id pub-id-type="doi">10.15388/Informatica.2003.022</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research article</subject></subj-group></article-categories><title-group><article-title>Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards</article-title></title-group><contrib-group><contrib contrib-type="Author"><name><surname>Chang</surname><given-names>Chin‐Chen</given-names></name><email xlink:href="mailto:ccc@cs.ccu.edu.tw">ccc@cs.ccu.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><aff id="j_INFORMATICA_aff_000">Department of Computer Science and Information Engineering, National Chung Cheng University, 160, Sanhsing, Minhsiung, Chaiyi 621, Taiwan</aff></contrib-group><contrib-group><contrib contrib-type="Author"><name><surname>Hwang</surname><given-names>Kuo‐Feng</given-names></name><email xlink:href="mailto:kfhwang@mail.ntit.edu.tw">kfhwang@mail.ntit.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_001"/></contrib><aff id="j_INFORMATICA_aff_001">Department of Multimedia Desgin, National Taichung Institute of Technology, 129, Sec. 3, Sanming Rd., Taichung 404, Taiwan</aff></contrib-group><pub-date pub-type="epub"><day>01</day><month>01</month><year>2003</year></pub-date><volume>14</volume><issue>3</issue><fpage>289</fpage><lpage>294</lpage><history><date date-type="received"><day>01</day><month>07</month><year>2001</year></date></history><abstract><p>Smart card has been adopted to various applications. In 2000, Hwang and Li proposed a remote user authentication scheme, which is also using smart card. Nine months later, Chan and Cheng pointed out that there is a weakness in the remote authentication scheme proposed by Hwang and Li. In this paper, we show that Chan and Cheng's attack does not work well because they did not consider the format of user's identity. In addition, we propose several ways to solve the problem of Chan and Cheng's attack.</p></abstract><kwd-group><label>Keywords</label><kwd>cryptography</kwd><kwd>authentication</kwd><kwd>cryptanalysis</kwd></kwd-group></article-meta></front></article>