Improving the security of 'a flexible biometrics remote user authentication scheme'

被引:134
作者
Khan, Muhammad Khurram [1 ]
Zhang, Jiashu [1 ]
机构
[1] SW Jiaotong Univ, Res Grp Biometr & Secur, Sichuan Prov Key Lab Signal & Informat Proc, Chengdu, Sichuan, Peoples R China
关键词
authentication; security; cryptanalysis; smart card; attacks;
D O I
10.1016/j.csi.2006.01.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Lin-Lai proposed 'a flexible biometrics remote user authentication scheme,' which is based on El Gamal's cryptosystem and fingerprint verification, and does not need to maintain verification tables on the server. They claimed that their scheme is secured from attacks and suitable for high security applications; however, we point out that their scheme is vulnerable and can easily be cryptanalyzed. We demonstrate that their scheme performs only unilateral authentication (only client authentication) and there is no mutual authentication between user and remote system, thus their scheme is susceptible to the server spoofing attack. To fill this security gap, we present an improvement which overcomes the weakness of Lin-Lai's scheme. As a result, our improved security patch establishes trust between client and remote system in the form of mutual authentication. Moreover, some standards for biometric-based authentication are also discussed, which should be followed during the development of biometric systems. (c) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:82 / 85
页数:4
相关论文
共 25 条
[1]  
Anderson R., 1993, P 1 ACM C COMP COMM, P215, DOI DOI 10.1145/168588.168615
[2]  
*ANSI, 2003, X9842003 ANSI
[3]   Authenticating public terminals [J].
Asokan, N ;
Debar, H ;
Steiner, M ;
Waidner, M .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (08) :861-870
[4]  
Awasthi A. K., 2004, T CRYPTOLOGY, V1, P15
[5]  
Chang CC, 2003, INFORMATICA-LITHUAN, V14, P289
[6]  
Cheng-Chi Lee, 2002, Operating Systems Review, V36, P46, DOI 10.1145/567331.567335
[7]  
Chien HY, 2005, AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, P245
[8]   A dynamic ID-based remote user authentication scheme [J].
Das, ML ;
Saxena, A ;
Gulati, VP .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :629-631
[9]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[10]  
Hsu CL, 2004, COMP STAND INTER, V26, P167, DOI [10.1016/S0920-5489(03)00094-1, 10.1016/s0920-5489(03)00094-1]