Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme

被引:0
作者
Ma, Chun-Guang [1 ]
Wang, Ding [1 ]
Zhang, Qi-Ming [1 ]
机构
[1] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin 150001, Peoples R China
来源
DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY | 2012年 / 7154卷
关键词
Dynamic ID; Authentication protocol; Non-tamper resistant; Smart card; Cryptanalysis; Anonymity; EFFICIENT; WEAKNESSES; SECURITY;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Anonymity is one of the important properties of remote authentication schemes to preserve user privacy. Recently, Sood et al. showed that Wang et al.'s dynamic ID-based remote user authentication scheme fails to preserve user anonymity and is vulnerable to various attacks if the smart card is non-tamper resistant. Consequently, an improved version of dynamic ID-based authentication scheme was proposed and claimed that it is efficient and secure. In this paper. however, we will show that Sood et al.'s scheme still cannot preserve user anonymity under their assumption. In addition, their scheme is also vulnerable to the offline password guessing attack and the stolen verifier attack. To remedy these security flaws, we propose an enhanced authentication scheme, which covers all the identified weaknesses of Sood et al.'s scheme and is more secure and efficient for practical application environment.
引用
收藏
页码:141 / 152
页数:12
相关论文
共 17 条
[1]  
[Anonymous], 2010, INT J NETW SECUR
[2]   An efficient nonce-based authentication scheme with key agreement [J].
Chen, YC ;
Yeh, LY .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) :982-994
[3]  
Chien HY, 2005, AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, P245
[4]   A dynamic ID-based remote user authentication scheme [J].
Das, ML ;
Saxena, A ;
Gulati, VP .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :629-631
[5]   Weaknesses of a dynamic ID-based remote user authentication scheme [J].
He, Debiao ;
Chen, Jianhua ;
Zhang, Rui .
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2010, 3 (04) :355-362
[6]   Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards [J].
Hsiang, Han-Cheng ;
Shih, Wei-Kuan .
COMPUTER COMMUNICATIONS, 2009, 32 (04) :649-652
[7]  
Hu LL, 2007, CNSR 2007: PROCEEDINGS OF THE FIFTH ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, P323
[8]   Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme' [J].
Khan, Muhammad Khurram ;
Kim, Soo-Kyun ;
Alghathbar, Khaled .
COMPUTER COMMUNICATIONS, 2011, 34 (03) :305-309
[9]  
Kocher P., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P388
[10]   Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards [J].
Ku, WC ;
Chen, SM .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (01) :204-207