An improvement of Hwang-Lee-Tang's simple remote user authentication scheme

被引:63
|
作者
Yoon, EJ [1 ]
Ryu, EK [1 ]
Yoo, KY [1 ]
机构
[1] Kyungpook Natl Univ, Dept Comp Engn, Taegu 702701, South Korea
关键词
cryptography; authentication; security; smart card; hash function;
D O I
10.1016/j.cose.2004.06.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Hwang-Lee-Tang proposed a simple remote user authentication scheme using smart card, whereby it does not require any password or verification tables in the remote system and any legal users could choose and change their passwords freely. However, their schemes previously generated user's secret hash values are insecure if the secret key of the server is leaked or is stolen, also when the smart card is stolen, unauthorized users can easily change new password of the smart card. Furthermore, their scheme cannot resist the denial of service attack using stolen smart card and does not provide mutual authentication. Accordingly, the current paper demonstrates the vulnerability of Hwang-Lee-Tang's scheme and presents an enhancement to resolve such problems. As a result, the proposed scheme previously generated secret hash values are secure even if the secret key of the system is leaked or is stolen and enables users to update their passwords freely and securely, while also providing mutual authentication and fast detect it when user inputs wrong password. In addition, the computational costs of this scheme are less than those of any previously proposed schemes. (C) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:50 / 56
页数:7
相关论文
共 50 条
  • [1] The improvement of Lee-Chiu's remote user authentication scheme
    Chan, Chao-Wen
    Lin, Chung-Chih
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 245 - +
  • [2] An improvement on Li and Hwang's biometrics-based remote user authentication scheme
    Shieh, Wen-Gong
    Wang, Mei-Tzu
    ICIC Express Letters, 2010, 4 (5 B): : 2021 - 2025
  • [3] An Improvement to Lee and Hwang's Scheme
    Tseng, Shao-Fan
    Chan, Chao-Wen
    2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, : 79 - 81
  • [4] A simple remote user authentication scheme
    Hwang, MS
    Lee, CC
    Tang, YL
    MATHEMATICAL AND COMPUTER MODELLING, 2002, 36 (1-2) : 103 - 107
  • [5] Improvement of Lee-Kim-Yoo's remote user authentication scheme using smart cards
    Sun, DZ
    Cao, ZF
    FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PT 2, PROCEEDINGS, 2005, 3614 : 596 - 599
  • [6] Cryptanalysis of Lee-Hwang-Li's key authentication scheme
    Zhang, FG
    Kim, K
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 161 (01) : 101 - 107
  • [7] Cryptanalysis and improvement of a remote user authentication scheme
    Ou Qingyu
    Huang Kai
    Li Guang
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL IV, PROCEEDINGS, 2009, : 49 - +
  • [8] Improvement of a Fingerprint-Based Remote User Authentication Scheme
    Xu, Jing
    Zhu, Wen-Tao
    Feng, Deng-Guo
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2008, 2 (03): : 73 - 80
  • [9] Improvement of a fingerprint-based remote user authentication scheme
    Xu, Jing
    Zhu, Wen-Tao
    Feng, Deng-Guo
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 87 - 92
  • [10] An improvement of remote user authentication scheme using smart cards
    Jeon, Jun-Cheol
    Kang, Byung-Heon
    Kim, Se-Min
    Lee, Wan-Soo
    Yoo, Kee-Young
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 416 - +