Further Cryptanalysis of 'A Remote Authentication Scheme Using Mobile Device'

被引:0
|
作者
Khan, Muhammad Khurram [1 ]
Kumari, Saru [2 ]
Gupta, Mridul Kumar [3 ]
机构
[1] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh, Saudi Arabia
[2] Dr BR Univ, Agra Coll, Dept Math, Agra, Uttar Pradesh, India
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut, Uttar Pradesh, India
来源
2012 FOURTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL ASPECTS OF SOCIAL NETWORKS (CASON) | 2012年
关键词
Mobile device; fingerprint; authentication; attacks; drawbacks; PASSWORD AUTHENTICATION; SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In 2008, Khan et al. proposed a remote user authentication scheme on mobile device, using hash-function and fingerprint biometric. In 2010, Chen et al. discussed some security weaknesses of Khan et al.'s scheme and subsequently proposed an improved scheme. Recently, Truong et al. have demonstrated that in Chen et al.'s scheme, an adversary can successfully replay an intercepted login request. They also showed how an adversary can cheat both the legal participants, by taking advantage of the fact that the scheme does not provide anonymity to the user. In this paper, we show that Chen et al.'s scheme suffers from some additional drawbacks which were not presented by Truong et al. in its analysis.
引用
收藏
页码:234 / 237
页数:4
相关论文
共 50 条
  • [21] A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design
    Xiong Li
    Junguo Liao
    Saru Kumari
    Wei Liang
    Fan Wu
    Muhammad Khurram Khan
    Wireless Personal Communications, 2015, 85 : 263 - 288
  • [22] Biometric-based Remote Mutual Authentication Scheme for Mobile Device
    Sheng-Kai Chen
    Jenq-Shiou Leu
    Wen-Bin Hsieh
    Jui-Tang Wang
    Tian Song
    Wireless Personal Communications, 2022, 126 : 1649 - 1664
  • [23] Robust mobile device integration of a fingerprint biometric remote authentication scheme
    Toan-Thinh Truong
    Minh-Triet Tran
    Anh-Duc Duong
    2012 IEEE 26TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2012, : 678 - 685
  • [24] Biometric-based Remote Mutual Authentication Scheme for Mobile Device
    Chen, Sheng-Kai
    Leu, Jenq-Shiou
    Hsieh, Wen-Bin
    Wang, Jui-Tang
    Song, Tian
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (02) : 1649 - 1664
  • [25] Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards
    WANG DingMA Chunguang College of Computer Science and TechnologyHarbin Engineering UniversityHarbin China Automobile Management Institute of PLABengbu China
    The Journal of China Universities of Posts and Telecommunications, 2012, 19 (05) : 104 - 114
  • [27] Cryptanalysis and an Improvement of New Remote Mutual Authentication Scheme using Smart Cards
    Karuppiah, Marimuthu
    Saravanan, R.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2015, 18 (05): : 623 - 649
  • [28] Cryptanalysis of a remote user authentication scheme for mobile client-server environment based on ECC
    Wang, Ding
    Ma, Chun-guang
    INFORMATION FUSION, 2013, 14 (04) : 498 - 503
  • [29] Cryptanalysis of an Anonymous Mutual Authentication Scheme for Secure Inter-device Communication in Mobile Networks
    Wu, Tsu-Yang
    Fang, Weicheng
    Chen, Chien-Ming
    Wang, Guangjie
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT I, 2018, 81 : 206 - 213
  • [30] Cryptanalysis of flexible remote password authentication scheme of ICN'01
    Kim, S
    Lim, S
    Won, D
    ELECTRONICS LETTERS, 2002, 38 (24) : 1519 - 1520