An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo's Scheme

被引:11
作者
Irshad, Azeem [1 ]
Sher, Muhammad [1 ]
Ashraf, Muhammad Usman [1 ,6 ]
Alzahrani, Bander A. [3 ]
Wu, Fan [2 ]
Xie, Qi [4 ]
Kumari, Saru [5 ]
机构
[1] Int Islamic Univ, Comp Sci Dept, Islamabad, Pakistan
[2] Xiamen Inst Technol, Dept Comp Sci & Engn, Xiamen 361021, Peoples R China
[3] King Abdulaziz Univ, Coll Comp & Informat Technol, Jeddah, Saudi Arabia
[4] Hangzhou Normal Univ, Hangzhou Key Lab Cryptog & Network Secur, Hangzhou, Zhejiang, Peoples R China
[5] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
[6] Univ Agr Faisalabad, IBMS, Faisalabad, Pakistan
关键词
Multi-server authentication; Remote authentication; Attacks; Chebyshev chaotic map; KEY AGREEMENT PROTOCOL; WAY HASH FUNCTION; ARCHITECTURE; EFFICIENT; CRYPTANALYSIS;
D O I
10.1007/s11277-017-3990-0
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The simple password based authentication techniques have been evolving into more secure and advanced protocols, capable of countering the advanced breed of threats. Following this development, the multi-server authentication (MSA), lets subscribers the provision of services from various service providers out of a single registration performed initially. The user seeks to register from registration centre first, and could avail a range of services onwards. The research efforts on MSA based framework, for making it lightweight and security resilient, has been going on a reasonable pace. However, yet we have not come up with a framework that can be relied upon for deployment in an access network bearing nodes that demand low computational cost. Recently, in this regard, Tsai and Lo presented a chaotic map-based multi-server authentication protocol. However, the Tsai and Lo scheme is found vulnerable to key-compromise impersonation attack, Bergamo et al. and password guessing attack by Lu et al. In return, Lu et al. presented a model countering the flaws of Tsai and Lo scheme. We review both schemes and found that Tsai et al. is still vulnerable to more threats, and at the same time, we demonstrate that Lu et al. is also vulnerable to RC-spoofing attack, replay attack, anonymity failure and bears some technical flaws. In this paper, we propose a secure and efficient scheme improved upon Tsai et al. protocol. Besides, this study work presents the formal security analysis using BAN logic and performance efficiency has also been evaluated against contemporary protocols.
引用
收藏
页码:3185 / 3208
页数:24
相关论文
共 40 条
[1]  
[Anonymous], ARXIV12010883V1
[2]   Cryptography with chaos [J].
Baptista, MS .
PHYSICS LETTERS A, 1998, 240 (1-2) :50-54
[3]   An efficient and secure multi-server password authentication scheme using smart cards [J].
Chang, CC ;
Lee, JS .
2004 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2004, :417-422
[4]   An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography [J].
Chaudhry, Shehzad Ashraf ;
Naqvi, Husnain ;
Mahmood, Khalid ;
Ahmad, Hafiz Farooq ;
Khan, Muhammad Khurram .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) :5355-5373
[6]   An enhanced privacy preserving remote user authentication scheme with provable security [J].
Chaudhry, Shehzad Ashraf ;
Farash, Mohammad Sabzinejad ;
Naqvi, Husnain ;
Kumari, Saru ;
Khan, Muhammad Khurram .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) :3782-3795
[7]   An improved and provably secure privacy preserving authentication protocol for SIP [J].
Chaudhry, Shehzad Ashraf ;
Naqvi, Husnain ;
Sher, Muhammad ;
Farash, Mohammad Sabzinejad ;
ul Hassan, Mahmood .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) :1-15
[8]   Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems [J].
Chaudhry, Shehzad Ashraf ;
Naqvi, Husnain ;
Shon, Taeshik ;
Sher, Muhammad ;
Farash, Mohammad Sabzinejad .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (06)
[9]   An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps [J].
Chen, Guo ;
Chen, Yong ;
Liao, Xiaofeng .
CHAOS SOLITONS & FRACTALS, 2007, 31 (03) :571-579
[10]  
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523