Robust smart-card-based remote user password authentication scheme

被引:136
作者
Chen, Bae-Ling [1 ]
Kuo, Wen-Chung [2 ]
Wuu, Lih-Chyau [3 ]
机构
[1] Natl Yunlin Univ Sci & Technol, Grad Sch Engn Sci & Technol, Touliu 64002, Yunlin, Taiwan
[2] Natl Yunlin Univ Sci & Technol, Dept Comp Sci & Informat Engn, Touliu 64002, Yunlin, Taiwan
[3] Natl Yunlin Univ Sci & Technol, Inst Comp Sci & Informat Engn, Touliu 64002, Yunlin, Taiwan
关键词
smart card; session key agreement; mutual authentication; internal attack; stolen-smart-cardattack;
D O I
10.1002/dac.2368
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Smart-card-based remote user password authentication schemes are commonly used for providing authorized users a secure method for remotely accessing resources over insecure networks. In 2009, Xu etal. proposed a smart-card-based password authentication scheme. They claimed their scheme can withstand attacks when the information stored on the smart card is disclosed. Recently, Sood etal. and Song discovered that the smart-card-based password authentication scheme of Xu etal. is vulnerable to impersonation and internal attacks. They then proposed their respective improved schemes. However, we found that there are still flaws in their schemes: the scheme of Sood etal. does not achieve mutual authentication and the secret key in the login phase of Song's scheme is permanent and thus vulnerable to stolen-smart-card and off-line guessing attacks. In this paper, we will propose an improved and efficient smart-card-based password authentication and key agreement scheme. According to our analysis, the proposed scheme not only maintains the original secret requirement but also achieves mutual authentication and withstands the stolen-smart-card attack. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:377 / 389
页数:13
相关论文
共 16 条
[1]  
[Anonymous], 2010, P 3 ANN ACM BANG C C
[2]   A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS [J].
Chen, Bae-Ling ;
Kuo, Wen-Chung ;
Wuu, Lih-Chyau .
INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (01) :53-59
[3]   An efficient and practical solution to remote authentication: Smart card [J].
Chien, HY ;
Jan, JK ;
Tseng, YM .
COMPUTERS & SECURITY, 2002, 21 (04) :372-375
[4]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[5]  
Forouzan B.A., 2008, Introduction to cryptography and network security
[6]   A new remote user authentication scheme using smart cards [J].
Hwang, MS ;
Li, LH .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) :28-30
[7]  
Kocher P, 1999, ADV CRYPTOLOGY CRYPT, V1666, P788
[8]   PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION [J].
LAMPORT, L .
COMMUNICATIONS OF THE ACM, 1981, 24 (11) :770-772
[9]   Improvement of Chien et al.'s remote user authentication scheme using smart cards [J].
Lee, SW ;
Kim, HS ;
Yoo, KY .
COMPUTER STANDARDS & INTERFACES, 2005, 27 (02) :181-183
[10]   On a simple three-party password-based key exchange protocol' [J].
Lin, Ching-Ying ;
Hwang, Tzonelih .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (11) :1520-1532