An improved dynamic ID-based remote user authentication with key agreement scheme

被引:100
作者
Wen, Fengtong [1 ]
Li, Xuelei [1 ]
机构
[1] Univ Jinan, Sch Math Sci, Jinan, Shandong, Peoples R China
关键词
PASSWORD AUTHENTICATION; ENHANCEMENT;
D O I
10.1016/j.compeleceng.2011.11.010
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In 2009, Wang et al. presented a dynamic ID-based remote user authentication scheme and claimed that their scheme was more efficient and secure. In this paper, we point out that their scheme is not secure against impersonation attacks launched by any adversary at anytime and could leak some key information to legal users, who can launch an off-line guessing attack. If the adversary could get the secret information stored in the smart cards someway, their scheme will be completely broken down. In addition, their scheme does not provide anonymity for the users, and lacks the functionalities of revocation, key exchange and secret renew for users and servers. Furthermore, we propose a more secure and robust scheme, which does not only cover all the above security flaws and weaknesses, but also provides more functionalities. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:381 / 387
页数:7
相关论文
共 15 条
[1]  
Awasthi A. K., 2004, T CRYPTOLOGY, V1, P15
[2]   REMOTE PASSWORD AUTHENTICATION WITH SMART CARDS [J].
CHANG, CC ;
WU, TC .
IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1991, 138 (03) :165-168
[3]   A dynamic ID-based remote user authentication scheme [J].
Das, ML ;
Saxena, A ;
Gulati, VP .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :629-631
[4]   An enhancement of timestamp-based password authentication scheme [J].
Fan, L ;
Li, JH ;
Zhu, HW .
COMPUTERS & SECURITY, 2002, 21 (07) :665-667
[5]   Two efficient two-factor authenticated key exchange protocols in public wireless LANs [J].
Juang, Wen-Shenq ;
Wu, Jing-Lin .
COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) :33-40
[6]   Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme' [J].
Khan, Muhammad Khurram ;
Kim, Soo-Kyun ;
Alghathbar, Khaled .
COMPUTER COMMUNICATIONS, 2011, 34 (03) :305-309
[7]  
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[8]   Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards [J].
Ku, WC ;
Chang, ST .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (05) :2165-2167
[9]   PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION [J].
LAMPORT, L .
COMMUNICATIONS OF THE ACM, 1981, 24 (11) :770-772
[10]  
Liao IE, 2005, International Conference on Next Generation Web Services Practices, P437