Breaking two remote user authentication systems for mobile devices

被引:3
|
作者
Li, Wenting [1 ]
Gu, Qianchen [2 ]
Zhao, Yiming [1 ]
Wang, Ping [1 ,3 ]
机构
[1] Peking Univ, Sch Software & Microelect, Beijing 100871, Peoples R China
[2] Peking Univ, Sch Elect Engn & Comp Sci, Beijing 100871, Peoples R China
[3] Natl Engn Res Ctr Software Engn, Beijing, Peoples R China
关键词
Smart-card-based user authentication; User anonymity; De-synchronization attack; User friendliness; KEY AGREEMENT SCHEME; MUTUAL AUTHENTICATION; PASSWORD AUTHENTICATION; SMART CARDS; SECURE; EFFICIENT; PROTOCOL; ANONYMITY; IDENTITY;
D O I
10.1109/BigDataSecurity.2017.34
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Smart-card-based user authentication is a significant security mechanism that allows remote users to be granted access to services and resources in distributed computing environments like clouds. In this paper, we revisit two password authentication schemes with smart cards proposed by Mishra et al. and Wu et al. in 2015, respectively. We demonstrate that: (1) Despite being armed with a formal security proof in both schemes, Mishra et al.'s scheme actually cannot achieve the claimed feature of user anonymity and is vulnerable to insider attack; and (2) Wu et al.'s scheme remains being susceptible to de-synchronization attack as they stated to overcome the weaknesses of Kumar et al.'s scheme. Furthermore, with the cryptanalysis of these two schemes and our previous protocol design and analysis experience, we figure out two principles to design more robust smart-card-based user authentication schemes. The proposed principles would be helpful to protocol designers for proposing schemes with desirable user friendliness and security.
引用
收藏
页码:37 / 42
页数:6
相关论文
共 50 条
  • [21] An interactive and secure user authentication scheme for mobile devices
    Sun, Qibin
    Li, Zhi
    Jiang, Xudong
    Kot, Alex
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, : 2973 - +
  • [22] Implicit User Re-authentication for Mobile Devices
    Yazji, Sausan
    Chen, Xi
    Dick, Robert P.
    Scheuermann, Peter
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2009, 5585 : 325 - +
  • [23] On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems
    Kee-Won Kim
    Jae-Dong Lee
    Journal of Medical Systems, 2014, 38
  • [24] On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems
    Kim, Kee-Won
    Lee, Jae-Dong
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (05)
  • [25] A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices
    Yoon, Eun-Jim
    Yoo, Kee-Young
    ADVANCES IN WEB AND NETWORK TECHNOLOGIES, AND INFORMATION MANAGEMENT, PROCEEDINGS, 2007, 4537 : 612 - +
  • [26] A NEW FINGERPRINT BIOMETRIC REMOTE USER AUTHENTICATION SCHEME USING CHAOTIC HASH FUNCTION ON MOBILE DEVICES
    Yoon, Eun-Jun
    Yoo, Kee-Young
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2010, 16 (03): : 471 - 487
  • [27] Breaking a remote user authentication scheme for multi-server architecture
    Cao, Xiang
    Zhong, Sheng
    IEEE COMMUNICATIONS LETTERS, 2006, 10 (08) : 580 - 581
  • [28] Attribute-based Continuous User Authentication on Mobile Devices
    Samangouei, Pouya
    Patel, Vishal M.
    Chellappa, Rama
    2015 IEEE 7TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS 2015), 2015,
  • [29] Secure user authentication based on the trusted platform for mobile devices
    Kim, GeonLyang
    Lim, JaeDeok
    Kim, JeongNyeo
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [30] Secure user authentication based on the trusted platform for mobile devices
    GeonLyang Kim
    JaeDeok Lim
    JeongNyeo Kim
    EURASIP Journal on Wireless Communications and Networking, 2016