Two efficient two-factor authenticated key exchange protocols in public wireless LANs

被引:31
作者
Juang, Wen-Shenq [1 ]
Wu, Jing-Lin [2 ]
机构
[1] Natl Kaohsiung 1 Univ Sci & Technol, Dept Informat Management, YenChao 824, Kaohsiung Cty, Taiwan
[2] Shih Hsin Univ, Dept Informat Management, Taipei 116, Taiwan
关键词
SMART CARDS; SCHEME; CRYPTANALYSIS; CRYPTOGRAPHY; IMPROVEMENT; SECURITY;
D O I
10.1016/j.compeleceng.2008.03.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Parks et al. proposed an authentication and key agreement protocol for low-power PDAs in public wireless LANS using two factors including a password and a token, e.g. a smart card. They claimed that their proposed scheme provided mutual authentication, identity privacy, half-forward secrecy and low computation cost for a client including just one symmetric key encryption and five hash operations. In this paper, we point out that Park et al.'s protocol is vulnerable to the dictionary attack upon identity privacy. We propose two schemes with mutual authentication, half-forward secrecy, lower computation cost and less exchanged messages than Park et al.'s protocol. In additional to these properties. identity privacy, which is not satisfied by Park et al.'s protocol, is also provided by our second scheme. (C) 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:33 / 40
页数:8
相关论文
共 16 条
[1]  
[Anonymous], 197 NIST FIPS PUB
[2]   An enhanced remote user authentication scheme using smart cards [J].
Awasthi, AK ;
Lal, S .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :583-586
[3]  
BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
[4]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[5]   Efficient password authenticated key agreement using smart cards [J].
Juang, WS .
COMPUTERS & SECURITY, 2004, 23 (02) :167-173
[6]   Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards [J].
Ku, WC ;
Chen, SM .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (01) :204-207
[7]   New remote user authentication scheme using smart cards [J].
Kumar, M .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :597-600
[8]   Security analysis and improvement of the efficient password-based authentication protocol [J].
Kwon, T ;
Park, YH ;
Lee, HJ .
IEEE COMMUNICATIONS LETTERS, 2005, 9 (01) :93-95
[9]   PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION [J].
LAMPORT, L .
COMMUNICATIONS OF THE ACM, 1981, 24 (11) :770-772
[10]   The advantages of elliptic curve cryptography for wireless security [J].
Lauter, K .
IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01) :62-67