Cryptanalysis and Security Enhancement of an Efficient and Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environments

被引:0
作者
Banerjee, Subhasish [1 ]
Dutta, Manash Pratim [1 ]
Bhunia, Chandan Tilak [1 ]
机构
[1] NIT, Dept Comp Sci Engg, Nirjuli 791112, Arunachal Prade, India
来源
ICARCSET'15: PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN COMPUTER SCIENCE ENGINEERING & TECHNOLOGY (ICARCSET - 2015) | 2015年
关键词
Dynamic ID; Authentication; Cryptography; User anonymity; Smart card; PASSWORD AUTHENTICATION; IMPROVEMENT;
D O I
10.1145/2743065.2743079
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Password based authentication schemes have been widely used to verify the legitimacy of a user over an insecure communication channel. A common feature among most of the published schemes is that user's identity (ID) is static in all the transaction sessions, which may leak some information about the user and can create risk of identity theft during message transaction. Therefore, to provide user anonymity, many dynamic ID based remote users authentication schemes have been proposed. Recently, Khan et al. proposed an efficient and secure dynamic ID based remote user authentication scheme and claimed that their scheme can provide strong security against various attacks. In this paper, we have demonstrated that Khan et al.'s scheme is vulnerable to server spoofing attack and insider attack, and has some flaws in login and authentication phase as well and also proposed an enhanced scheme to overcome the identified weaknesses.
引用
收藏
页数:6
相关论文
共 20 条
[1]  
Bindu CS, 2008, INT J COMPUT SCI NET, V8, P62
[2]   Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards [J].
Das, A. K. .
IET INFORMATION SECURITY, 2011, 5 (03) :145-151
[3]   A dynamic ID-based remote user authentication scheme [J].
Das, ML ;
Saxena, A ;
Gulati, VP .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :629-631
[4]   An enhancement of timestamp-based password authentication scheme [J].
Fan, L ;
Li, JH ;
Zhu, HW .
COMPUTERS & SECURITY, 2002, 21 (07) :665-667
[5]   A new remote user authentication scheme using smart cards [J].
Hwang, MS ;
Li, LH .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) :28-30
[6]   Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme' [J].
Khan, Muhammad Khurram ;
Kim, Soo-Kyun ;
Alghathbar, Khaled .
COMPUTER COMMUNICATIONS, 2011, 34 (03) :305-309
[7]   PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION [J].
LAMPORT, L .
COMMUNICATIONS OF THE ACM, 1981, 24 (11) :770-772
[8]   A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards [J].
Lee, Cheng-Chi ;
Lin, Tsung-Hung ;
Chang, Rui-Xiang .
EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (11) :13863-13870
[9]   CRYPTOGRAPHIC AUTHENTICATION OF TIME-INVARIANT QUANTITIES [J].
LENNON, RE ;
MATYAS, SM ;
MEYER, CH .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1981, 29 (06) :773-777
[10]   An efficient biometrics-based remote user authentication scheme using smart cards [J].
Li, Chun-Ta ;
Hwang, Min-Shiang .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 33 (01) :1-5