Further Cryptanalysis of 'A Remote Authentication Scheme Using Mobile Device'

被引:0
|
作者
Khan, Muhammad Khurram [1 ]
Kumari, Saru [2 ]
Gupta, Mridul Kumar [3 ]
机构
[1] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh, Saudi Arabia
[2] Dr BR Univ, Agra Coll, Dept Math, Agra, Uttar Pradesh, India
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut, Uttar Pradesh, India
来源
2012 FOURTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL ASPECTS OF SOCIAL NETWORKS (CASON) | 2012年
关键词
Mobile device; fingerprint; authentication; attacks; drawbacks; PASSWORD AUTHENTICATION; SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In 2008, Khan et al. proposed a remote user authentication scheme on mobile device, using hash-function and fingerprint biometric. In 2010, Chen et al. discussed some security weaknesses of Khan et al.'s scheme and subsequently proposed an improved scheme. Recently, Truong et al. have demonstrated that in Chen et al.'s scheme, an adversary can successfully replay an intercepted login request. They also showed how an adversary can cheat both the legal participants, by taking advantage of the fact that the scheme does not provide anonymity to the user. In this paper, we show that Chen et al.'s scheme suffers from some additional drawbacks which were not presented by Truong et al. in its analysis.
引用
收藏
页码:234 / 237
页数:4
相关论文
共 50 条
  • [1] Weakness Cryptanalysis of Liao's Scheme and Improved Remote User Authentication Scheme for Mobile Device
    Do Kim, Hie
    Shin, Kwang Cheul
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (05): : 11 - 19
  • [2] Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards
    Ku, WC
    Chang, ST
    Chiang, MH
    ELECTRONICS LETTERS, 2005, 41 (05) : 240 - 241
  • [3] Further cryptanalysis of a remote login authentication scheme based on geometric approach
    Li, Y
    Li, JT
    Proceedings of the 11th Joint International Computer Conference, 2005, : 143 - 146
  • [4] Cryptanalysis of a remote password authentication scheme
    Chan, CK
    Cheng, LM
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2001, 78 (03) : 323 - 326
  • [5] Cryptanalysis of a remote login authentication scheme
    Hwang, MS
    COMPUTER COMMUNICATIONS, 1999, 22 (08) : 742 - 744
  • [6] Cryptanalysis of a remote user authentication scheme
    Wang, Bangju
    Zhang, Huanguo
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1699 - 1701
  • [7] Cryptanalysis of a remote login authentication scheme
    Department of Information Management, Chao Yang Univ. Technol., P.O. B., Taichung, Taiwan
    Comput Commun, 8 (742-744):
  • [8] Further cryptanalysis of 'A user friendly remote user authentication scheme with smart cards'
    Khan, Muhammad Khurram
    ICIET 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND EMERGING TECHNOLOGIES, 2007, : 101 - 105
  • [9] Cryptanalysis of a remote user authentication scheme using smart cards
    Huang Kai
    Ou Qingyu
    Wu Xiaoping
    Song Yexin
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4490 - 4493
  • [10] Cryptanalysis of a remote user authentication scheme using smart cards
    Chan, CK
    Cheng, LM
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (04) : 992 - 993