An improvement of Hwang-Lee-Tang's simple remote user authentication scheme

被引:63
作者
Yoon, EJ [1 ]
Ryu, EK [1 ]
Yoo, KY [1 ]
机构
[1] Kyungpook Natl Univ, Dept Comp Engn, Taegu 702701, South Korea
关键词
cryptography; authentication; security; smart card; hash function;
D O I
10.1016/j.cose.2004.06.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Hwang-Lee-Tang proposed a simple remote user authentication scheme using smart card, whereby it does not require any password or verification tables in the remote system and any legal users could choose and change their passwords freely. However, their schemes previously generated user's secret hash values are insecure if the secret key of the server is leaked or is stolen, also when the smart card is stolen, unauthorized users can easily change new password of the smart card. Furthermore, their scheme cannot resist the denial of service attack using stolen smart card and does not provide mutual authentication. Accordingly, the current paper demonstrates the vulnerability of Hwang-Lee-Tang's scheme and presents an enhancement to resolve such problems. As a result, the proposed scheme previously generated secret hash values are secure even if the secret key of the system is leaked or is stolen and enables users to update their passwords freely and securely, while also providing mutual authentication and fast detect it when user inputs wrong password. In addition, the computational costs of this scheme are less than those of any previously proposed schemes. (C) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:50 / 56
页数:7
相关论文
共 50 条
  • [1] A simple remote user authentication scheme
    Hwang, MS
    Lee, CC
    Tang, YL
    MATHEMATICAL AND COMPUTER MODELLING, 2002, 36 (1-2) : 103 - 107
  • [2] An Improvement to Lee and Hwang's Scheme
    Tseng, Shao-Fan
    Chan, Chao-Wen
    2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, : 79 - 81
  • [3] Security Improvement on a Remote User Authentication Scheme Using Smart Cards
    Chen, Tien-Ho
    Hsiang, Han-Cheng
    Shih, Wei-Kuan
    INFORMATION SECURITY AND ASSURANCE, 2010, 76 : 9 - +
  • [4] Cryptanalysis and improvement of a remote user authentication scheme
    Ou Qingyu
    Huang Kai
    Li Guang
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL IV, PROCEEDINGS, 2009, : 49 - +
  • [5] A Survey on Attacks in Remote User Authentication Scheme
    Limbasiya, Trupil
    Doshi, Nishant
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 1157 - 1160
  • [6] Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
    Wang, Xiao-Min
    Zhang, Wen-Fang
    Zhang, Jia-Shu
    Khan, Muhammad Khurram
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (05) : 507 - 512
  • [7] Remote user authentication scheme with user anonymity
    Lee, WB
    Chen, HB
    Dow, CR
    SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 412 - 417
  • [8] Cryptanalysis and Improvement on Remote User Mutual Authentication Scheme with Smart Cards
    Arshad, Razi
    Ikram, Nassar
    11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 1202 - 1206
  • [9] Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card
    Amin, Ruhul
    Maitra, Tanmoy
    Giri, Debasis
    Srivastava, P. D.
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (03) : 4629 - 4659
  • [10] Cryptanalysis and Improvement of Remote User Authentication Scheme Using Smart Card
    Madhusudhan, R.
    Hegde, Manjunath
    PROCEEDINGS OF 6TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE 2016), 2016, : 84 - 89