Cryptanalysis of a Multifactor Authentication Protocol

被引:2
作者
Likitha, Soorea [1 ]
Saravanan, R. [1 ]
机构
[1] VIT Univ, Sch Informat Technol & Engn, Vellore, Tamil Nadu, India
来源
RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1 | 2019年 / 707卷
关键词
Cryptanalysis; Smart card; Authentication; Session agreement; Secure channel; Public channel; EFFICIENT;
D O I
10.1007/978-981-10-8639-7_4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cybercrime analysis reports state that the crime percentage has been doubled from past 3 to 4 years, and most of the crimes are being successful due to the lack of proper identity verification mechanism that is nothing but the authenticity verificationmechanism. The authentication of the user can be done by various authentication protocols but still, the attacks are being success; this shows the necessity of improving the efficiency of the authentication algorithms, and this can be done accurately by analysis various existingmechanisms proposed by various researchers. On analyzing the various protocols of authentication, the loop pits of the existing schemes can be recorded, which gives an ideology of filling the loopholes of the same. Therefore, this paper analyzes the most recently proposed multifactor authentication scheme by Mishra et al. Based on various characteristics that are to be considered in designing an authentication protocol, the scheme is been analyzed. A detailed explanation of various vulnerabilities of Mishra et al.'s scheme is given in this paper.
引用
收藏
页码:35 / 42
页数:8
相关论文
共 10 条
[1]  
[Anonymous], 2016, IEEE WCNC
[2]   A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography [J].
Chaudhry, Shehzad Ashraf ;
Khan, Muhammad Tawab ;
Khan, Muhammad Khurram ;
Shon, Taeshik .
JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
[3]  
Ding W., 2012, J CHINA U POSTS TELE
[4]  
Fan C.-I., 2005, COMPUT SECUR
[5]   Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme' [J].
Khan, Muhammad Khurram ;
Kim, Soo-Kyun ;
Alghathbar, Khaled .
COMPUTER COMMUNICATIONS, 2011, 34 (03) :305-309
[6]   Cryptanalysis of a modified remote user authentication scheme using smart cards [J].
Leung, KC ;
Cheng, LM ;
Fong, AS ;
Chan, CK .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2003, 49 (04) :1243-1245
[7]   Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multiserver Environment [J].
Shunmuganathan, Saraswathi ;
Saravanan, Renuka Devi ;
Palanichamy, Yogesh .
CANADIAN JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING-REVUE CANADIENNE DE GENIE ELECTRIQUE ET INFORMATIQUE, 2015, 38 (01) :20-30
[8]  
Wan T., 2016, INT J SECUR APPL
[9]   Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards [J].
Wang, Xiao-Min ;
Zhang, Wen-Fang ;
Zhang, Jia-Shu ;
Khan, Muhammad Khurram .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (05) :507-512
[10]  
Yeh H.-L., 2014, COMPUT STAND INTERFA