Cryptanalysis and Improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee's Scheme

被引:5
|
作者
Irshad, Azeem [1 ]
Naqvi, Husnain [1 ]
Chaudhry, Shehzad Ashraf [1 ]
Usman, Muhammad [2 ]
Shafiq, Muhammad [3 ]
Mir, Omid [4 ]
Kanwal, Ambrina [5 ]
机构
[1] Int Islamic Univ, Dept Comp Sci & Software Engn, Islamabad, Pakistan
[2] Quaid I Azam Univ, Fac Nat Sci, Dept Comp Sci, Islamabad, Pakistan
[3] Univ Gujrat, Dept Informat Technol, Gujrat, Pakistan
[4] Johannes Kepler Univ Linz, Inst Networks & Secur, Linz, Austria
[5] Bahria Univ, Dept Comp Sci, Islamabad, Pakistan
来源
INFORMATION TECHNOLOGY AND CONTROL | 2018年 / 47卷 / 03期
关键词
Multi-server authentication; cryptanalysis; biometrics; remote authentication; attack; REMOTE USER AUTHENTICATION; CHAOTIC-MAP; MUTUAL AUTHENTICATION; ET-AL; SECURE; EFFICIENT; ANONYMITY; IDENTITY; PROTOCOL; IDENTIFICATION;
D O I
10.5755/j01.itc.47.3.17361
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multi-server authentication makes convenient to benefit from services of various service providers on the basis of one-time registration through a trusted third party. Since, the users are reluctant to register themselves separately from all servers due to the hassle of remembering many passwords and other cost constraints. The multi-server authentication enables the immediate provision of services by the real-time verification of users on an insecure channel. The literature for multi-server oriented authenticated key agreement could be traced back to Li et al. and Lee et al., in 2000. Since then, numerous multi-server authentication techniques have been put forth. Nonetheless, the research academia looks for more secure and efficient authentication protocols. Recently, Chen and Lee's scheme presented a two-factor multi-server key agreement protocol, which is found to be prone to impersonation, stolen smart card, key-compromise impersonation attack, and trace attacks. Besides, the scheme is also found to have the inefficient password modification procedure. We propose an improved protocol that counters the above limitations in almost an equivalent computation cost. Moreover, our protocol is supplemented with formal security analysis using BAN logic along with performance analysis and evaluation.
引用
收藏
页码:431 / 446
页数:16
相关论文
共 50 条
  • [21] A provably secure biometrics-based authenticated key agreement scheme for multi-server environments
    Kumari, Saru
    Das, Ashok Kumar
    Li, Xiong
    Wu, Fan
    Khan, Muhammad Khurram
    Jiang, Qi
    Islam, S. K. Hafizul
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (02) : 2359 - 2389
  • [22] An Improved Anonymous Multi-Server Authenticated Key Agreement Scheme Using Smart Cards and Biometrics
    Lin, Hao
    Wen, Fengtong
    Du, Chunxia
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (04) : 2351 - 2362
  • [23] An Improved Anonymous Multi-Server Authenticated Key Agreement Scheme Using Smart Cards and Biometrics
    Hao Lin
    Fengtong Wen
    Chunxia Du
    Wireless Personal Communications, 2015, 84 : 2351 - 2362
  • [24] A Robust User Anonymity Preserving Biometric Based Multi-server Authenticated Key Agreement Scheme
    Sarvabhatla, Mrudula
    Reddy, M. Chandra Mouli
    Narayana, Kodavali Lakshmi
    Vorugunti, Chandra Sekhar
    COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, ICC3 2015, 2016, 412 : 325 - 333
  • [25] An efficient and secure design of multi-server authenticated key agreement protocol
    Azeem Irshad
    Husnain Naqvi
    Shehzad Ashraf Chaudhry
    Shouket Raheem
    Saru Kumari
    Ambrina Kanwal
    Muhammad Usman
    The Journal of Supercomputing, 2018, 74 : 4771 - 4797
  • [26] Cryptanalysis and Improvement User Authentication Scheme for Multi-server Environment
    Kang, Dongwoo
    Moon, Jongho
    Lee, Donghoon
    Won, Dongho
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2016, PT V, 2016, 9790 : 87 - 99
  • [27] Cryptanalysis of Tan's improvement on a password authentication scheme for multi-server environments
    Feng, Tung-Huang
    Ling, Chung-Huei
    Hwang, Min-Shiang
    International Journal of Network Security, 2014, 16 (04) : 318 - 321
  • [28] An efficient and secure design of multi-server authenticated key agreement protocol
    Irshad, Azeem
    Naqvi, Husnain
    Chaudhry, Shehzad Ashraf
    Raheem, Shouket
    Kumari, Saru
    Kanwal, Ambrina
    Usman, Muhammad
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (09): : 4771 - 4797
  • [29] Cryptanalysis of the modified authenticated key agreement scheme
    Lee, KH
    Lee, BJ
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (01) : 280 - 284
  • [30] An efficient multi-server password authenticated key agreement scheme using smart cards with access control
    Chang, CC
    Kuo, JY
    AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 257 - 260