Cryptanalysis and Improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee's Scheme

被引:5
|
作者
Irshad, Azeem [1 ]
Naqvi, Husnain [1 ]
Chaudhry, Shehzad Ashraf [1 ]
Usman, Muhammad [2 ]
Shafiq, Muhammad [3 ]
Mir, Omid [4 ]
Kanwal, Ambrina [5 ]
机构
[1] Int Islamic Univ, Dept Comp Sci & Software Engn, Islamabad, Pakistan
[2] Quaid I Azam Univ, Fac Nat Sci, Dept Comp Sci, Islamabad, Pakistan
[3] Univ Gujrat, Dept Informat Technol, Gujrat, Pakistan
[4] Johannes Kepler Univ Linz, Inst Networks & Secur, Linz, Austria
[5] Bahria Univ, Dept Comp Sci, Islamabad, Pakistan
来源
INFORMATION TECHNOLOGY AND CONTROL | 2018年 / 47卷 / 03期
关键词
Multi-server authentication; cryptanalysis; biometrics; remote authentication; attack; REMOTE USER AUTHENTICATION; CHAOTIC-MAP; MUTUAL AUTHENTICATION; ET-AL; SECURE; EFFICIENT; ANONYMITY; IDENTITY; PROTOCOL; IDENTIFICATION;
D O I
10.5755/j01.itc.47.3.17361
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multi-server authentication makes convenient to benefit from services of various service providers on the basis of one-time registration through a trusted third party. Since, the users are reluctant to register themselves separately from all servers due to the hassle of remembering many passwords and other cost constraints. The multi-server authentication enables the immediate provision of services by the real-time verification of users on an insecure channel. The literature for multi-server oriented authenticated key agreement could be traced back to Li et al. and Lee et al., in 2000. Since then, numerous multi-server authentication techniques have been put forth. Nonetheless, the research academia looks for more secure and efficient authentication protocols. Recently, Chen and Lee's scheme presented a two-factor multi-server key agreement protocol, which is found to be prone to impersonation, stolen smart card, key-compromise impersonation attack, and trace attacks. Besides, the scheme is also found to have the inefficient password modification procedure. We propose an improved protocol that counters the above limitations in almost an equivalent computation cost. Moreover, our protocol is supplemented with formal security analysis using BAN logic along with performance analysis and evaluation.
引用
收藏
页码:431 / 446
页数:16
相关论文
共 50 条
  • [1] Cryptanalysis and Improvement of an Anonymous Multi-server Authenticated Key Agreement Scheme
    Kumari, Shipra
    Om, Hari
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (02) : 2513 - 2537
  • [2] Cryptanalysis and Improvement of an Anonymous Multi-server Authenticated Key Agreement Scheme
    Shipra Kumari
    Hari Om
    Wireless Personal Communications, 2017, 96 : 2513 - 2537
  • [3] Cryptanalysis of a multi-server password authenticated key agreement scheme using smart cards
    Ku, WC
    Chuang, HM
    Chiang, MH
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (11) : 3235 - 3238
  • [4] Cryptanalysis of Anonymous Authenticated and Key Agreement Scheme Based on Biometric for Multi-Server Environment
    Kuo, Wen-Chung
    Wei, Hong-Ji
    Chen, Yu-Hui
    Cheng, Jiin-Chiou
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 782 - 787
  • [5] Cryptanalysis of An Anonymous Multi-Server Authenticated Key Agreement Scheme Using Smart Cards and Biometrics
    Li, Chun-Ta
    Lee, Cheng-Chi
    Chen, Hua-Hsuan
    Syu, Min-Jie
    Wang, Chun-Cheng
    2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2015, : 498 - 502
  • [6] Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme
    Wang, Chengqi
    Zhang, Xiao
    Zheng, Zhiming
    PLOS ONE, 2016, 11 (02):
  • [7] Cryptanalysis and Improvement of a Biometrics-Based Multi-server Authentication with Key Agreement Scheme
    Kim, Hakhyun
    Jeon, Woongryul
    Lee, Kwangwoo
    Lee, Yunho
    Won, Dongho
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2012, PT III, 2012, 7335 : 391 - 406
  • [8] Cryptanalysis of Lee-Lee authenticated key agreement scheme
    Kim, KW
    Ryu, EK
    Yoo, KY
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 163 (01) : 193 - 198
  • [9] Improvement of Lee and Lee's authenticated key agreement scheme
    Lee, SW
    Kim, HS
    Yoo, KY
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (03) : 1049 - 1053
  • [10] An anonymous authenticated key-agreement scheme for multi-server infrastructure
    Akram, Muhammad Arslan
    Ghaffar, Zahid
    Mahmood, Khalid
    Kumari, Saru
    Agarwal, Kadambri
    Chen, Chien-Ming
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2020, 10 (01)