Further Cryptanalysis of 'A Remote Authentication Scheme Using Mobile Device'

被引:0
作者
Khan, Muhammad Khurram [1 ]
Kumari, Saru [2 ]
Gupta, Mridul Kumar [3 ]
机构
[1] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh, Saudi Arabia
[2] Dr BR Univ, Agra Coll, Dept Math, Agra, Uttar Pradesh, India
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut, Uttar Pradesh, India
来源
2012 FOURTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL ASPECTS OF SOCIAL NETWORKS (CASON) | 2012年
关键词
Mobile device; fingerprint; authentication; attacks; drawbacks; PASSWORD AUTHENTICATION; SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In 2008, Khan et al. proposed a remote user authentication scheme on mobile device, using hash-function and fingerprint biometric. In 2010, Chen et al. discussed some security weaknesses of Khan et al.'s scheme and subsequently proposed an improved scheme. Recently, Truong et al. have demonstrated that in Chen et al.'s scheme, an adversary can successfully replay an intercepted login request. They also showed how an adversary can cheat both the legal participants, by taking advantage of the fact that the scheme does not provide anonymity to the user. In this paper, we show that Chen et al.'s scheme suffers from some additional drawbacks which were not presented by Truong et al. in its analysis.
引用
收藏
页码:234 / 237
页数:4
相关论文
共 50 条
  • [31] Cryptanalysis of Multi Factor Authentication Scheme Using Smart Card
    Giani, Yasir
    Li Jianhua
    Chen Gongliang
    Mehmood, Zahid
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 2767 - 2770
  • [32] Cryptanalysis of a Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme
    Quan, Chunyi
    Jung, Jaewook
    Lee, Hakjun
    Kang, Dongwoo
    Won, Dongho
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 438 - 441
  • [33] Cryptanalysis of "An Improved Timestamp-Based Remote User Authentication Scheme"
    Kumari, Saru
    Gupta, Mridul K.
    Khan, Muhammad Khurram
    Bin Muhaya, Fahad T.
    2012 INTERNATIONAL CONFERENCE ON QUALITY, RELIABILITY, RISK, MAINTENANCE, AND SAFETY ENGINEERING (ICQR2MSE), 2012, : 1439 - 1442
  • [34] Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'
    Khan, Muhammad Khurram
    Kim, Soo-Kyun
    Alghathbar, Khaled
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 305 - 309
  • [35] Cryptanalysis on Improved Remote User Authentication Scheme Preserving User Anonymity
    Lee, Sung-Woon
    Kwon, Hyuck-Jin
    Kim, Hyun-Sung
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (10): : 21 - 24
  • [36] Cryptanalysis of a smart card-based remote authentication scheme with anonymity
    School of Computer Science and Technology, Huazhong University of Science and Technology, Hongshan Distract, Wuhan City, Hubei
    430074, China
    J. Comput. Theor. Nanosci., 11 (4778-4784): : 4778 - 4784
  • [37] Cryptanalysis of a SIP Authentication Scheme
    Liu, Fuwen
    Koenig, Hartmut
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 134 - 143
  • [38] Authentication and Transaction Verification Using QR Codes with a Mobile Device
    Chow, Yang-Wai
    Susilo, Willy
    Yang, Guomin
    Au, Man Ho
    Wang, Cong
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 437 - 451
  • [39] Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update
    Li, Xiong
    Niu, Jianwei
    Liao, Junguo
    Liang, Wei
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (02) : 374 - 382
  • [40] Enhancing CardSpace Authentication Using a Mobile Device
    Al-Sinani, Haitham S.
    Mitchell, Chris J.
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXV, 2011, 6818 : 201 - 216