Cryptanalysis and an Improvement of New Remote Mutual Authentication Scheme using Smart Cards

被引:19
作者
Karuppiah, Marimuthu [1 ]
Saravanan, R. [2 ]
机构
[1] VIT Univ, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
[2] VIT Univ, Sch Informat Technol & Engn, Vellore 632014, Tamil Nadu, India
关键词
Password authentication; User anonymity; Off-line password guessing attack; User impersonation attack;
D O I
10.1080/09720529.2015.1013693
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In this paper, the security of a remote user mutual authentication scheme using smart cards proposed by Rajaram et al., [Rajaram R, Amutha Prabakar M, New Remote Mutual Authentication Scheme using Smart Cards, Transactions on Data Privacy, 2(2009): 141--152] is analysed. We show that Rajaram et al., scheme is still vulnerable to user impersonation attacks, off-line password guessing attacks and time synchronization problem. Moreover, the scheme does not provide an option to change or update the password and efficient login, and lacks proper mutual authentication. We also propose a password-based remote user mutual authentication scheme which provides the remedy for the vulnerabilities of Rajaram et al., scheme. Furthermore, performance analysis shows that compared with Rajaram et al., authentication scheme, our proposed scheme is simple and secure.
引用
收藏
页码:623 / 649
页数:27
相关论文
共 62 条
[1]  
Barenghi A, 2012, P IEEE, V100, P3056, DOI 10.1109/JPROC.2012.2188769
[2]   Cryptanalysis of a remote user authentication scheme using smart cards [J].
Chan, CK ;
Cheng, LM .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (04) :992-993
[3]  
Chang CC, 2003, INFORMATICA-LITHUAN, V14, P289
[4]   Robust smart-card-based remote user password authentication scheme [J].
Chen, Bae-Ling ;
Kuo, Wen-Chung ;
Wuu, Lih-Chyau .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (02) :377-389
[5]   Lightweight and provably secure user authentication with anonymity for the global mobility network [J].
Chen, Chun ;
He, Daojing ;
Chan, Sammy ;
Bu, Jiajun ;
Gao, Yi ;
Fan, Rong .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (03) :347-362
[6]   A new method for using hash functions to solve remote user authentication [J].
Chen, Tzung-Her ;
Lee, Wei-Bin .
COMPUTERS & ELECTRICAL ENGINEERING, 2008, 34 (01) :53-62
[7]   An efficient and practical solution to remote authentication: Smart card [J].
Chien, HY ;
Jan, JK ;
Tseng, YM .
COMPUTERS & SECURITY, 2002, 21 (04) :372-375
[8]   Towards generalized ID-based user authentication for mobile multi-server environment [J].
Chuang, Yun-Hsin ;
Tseng, Yuh-Min .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (04) :447-460
[9]   Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments [J].
Chung, Hao-Rung ;
Ku, Wei-Chi ;
Tsaur, Maw-Jinn .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) :863-868
[10]  
DellAmico M., 2010, INFOCOM 2010 P IEEE, P1, DOI DOI 10.1109/INFCOM.2010.5461951