Security enhancement on an improvement on two remote user authentication schemes using smart cards

被引:57
作者
Chen, Tien-Ho [1 ]
Hsiang, Han-Cheng [2 ]
Shih, Wei-Kuan [1 ]
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsingchu 300, Taiwan
[2] Vanung Univ, Dept Informat Management, Chungli, Taiwan
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING-THEORY METHODS AND APPLICATIONS | 2011年 / 27卷 / 04期
关键词
Authentication; Cryptography; Password; Impersonation attack; Parallel session attack; PASSWORD AUTHENTICATION; EFFICIENT; CRYPTANALYSIS;
D O I
10.1016/j.future.2010.08.007
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the current level of development of network technologies, various business activities take place on the Internet, and therefore how to assure the security of these activities over an insecure communication channel has become one of the most important issues. Authentication is the first step to protect users. Recently, Wang et al. proposed a remote user authentication scheme using smart cards to provide users with secure activities over an insecure Internet environment. Wang et al. claimed that their scheme is secured against guessing attacks, forgery attacks and denial of service (DoS) attacks which Ku et al.'s and Yoon et al.'s schemes suffered from. In this paper, we state that Wang et al.'s scheme is still vulnerable to the impersonation attack and parallel session attack. Furthermore, we propose an enhancement of Wang et al.'s scheme and provide the criteria of authentication scheme which secures a user against the risk of attack over an insecure Internet environment, for instance, session key agreement, mutual authentication and perfect forward secrecy. Moreover, we analyze the security of our scheme and prove that ours is suitable for applications with high security requirements. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:377 / 380
页数:4
相关论文
共 17 条
[1]   Cryptanalysis of a remote user authentication scheme using smart cards [J].
Chan, CK ;
Cheng, LM .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (04) :992-993
[2]   An efficient and practical solution to remote authentication: Smart card [J].
Chien, HY ;
Jan, JK ;
Tseng, YM .
COMPUTERS & SECURITY, 2002, 21 (04) :372-375
[3]  
Hsu CL, 2004, COMP STAND INTER, V26, P167, DOI [10.1016/S0920-5489(03)00094-1, 10.1016/s0920-5489(03)00094-1]
[4]   A new remote user authentication scheme using smart cards [J].
Hwang, MS ;
Li, LH .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) :28-30
[5]   Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards [J].
Ku, WC ;
Chang, ST .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (05) :2165-2167
[6]   Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards [J].
Ku, WC ;
Chen, SM .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (01) :204-207
[7]  
Ku WC, 2003, IEICE T COMMUN, VE86B, P1682
[8]   PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION [J].
LAMPORT, L .
COMMUNICATIONS OF THE ACM, 1981, 24 (11) :770-772
[9]   CRYPTOGRAPHIC AUTHENTICATION OF TIME-INVARIANT QUANTITIES [J].
LENNON, RE ;
MATYAS, SM ;
MEYER, CH .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1981, 29 (06) :773-777
[10]   LIMITATIONS OF CHALLENGE-RESPONSE ENTITY AUTHENTICATION [J].
MITCHELL, C .
ELECTRONICS LETTERS, 1989, 25 (17) :1195-1196