Security Improvement on a Remote User Authentication Scheme Using Smart Cards

被引:0
作者
Chen, Tien-Ho [1 ]
Hsiang, Han-Cheng [2 ]
Shih, Wei-Kuan [1 ]
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, 101 Kuang Fu Rd,Sec 2, Hsinchu 300, Taiwan
[2] Vanung Univ, Dept Informat Management, Taoyuan, Taiwan
来源
INFORMATION SECURITY AND ASSURANCE | 2010年 / 76卷
关键词
Authentication; Security; Cryptography; Password; Smart card; PASSWORD AUTHENTICATION; EFFICIENT; NETWORKS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Authentication is a very important ingredient service for the network system to verify whether a remote user is legal through any insecure channel. Recently. Hsiang and Shih proposed a remote user authentication scheme as an improved scheme over Yoon-Ryu-Yoo's, and asserted that their scheme could escape from masquerade attack, parallel session attack, etc. In this paper, we show that Hsiang and Shih's scheme still suffers from parallel session attack. To mend the problem, we offer a procedure to improve Hsiang and Shih's scheme. Consequently, our scheme is suitable for applications with higher secure requirement.
引用
收藏
页码:9 / +
页数:3
相关论文
共 20 条
  • [1] [Anonymous], INFORM PROCESSING LE
  • [2] An efficient and practical solution to remote authentication: Smart card
    Chien, HY
    Jan, JK
    Tseng, YM
    [J]. COMPUTERS & SECURITY, 2002, 21 (04) : 372 - 375
  • [3] NEW DIRECTIONS IN CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
  • [4] Duan X., 2006, 2006 IEEE INT C COMP, V2, P1133
  • [5] Halevi S., 1999, ACM Trans. Inf. Syst. Secur, V2, P230
  • [6] Hsiang H., COMPUTER COMMUNICATI, V32, P649
  • [7] A new remote user authentication scheme using smart cards
    Hwang, MS
    Li, LH
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) : 28 - 30
  • [8] HWANG T, 1995, IEEE T COMMUN, V43, P1947
  • [9] Hwang T., 1990, IEEE REG 10 C COMP C, V1, P429
  • [10] A one round protocol for tripartite Diffie-Hellman
    Joux, A
    [J]. JOURNAL OF CRYPTOLOGY, 2004, 17 (04) : 263 - 276