Efficient Two-Factor Authentication Protocol Using Password and Smart Card

被引:2
作者
Liu, Fenghua [1 ]
机构
[1] Xuzhou Inst Technol, Sch Math & Phys Sci, Xuzhou 221008, Jiangsu, Peoples R China
关键词
authentication; smart card; forward secrecy; off-line password guessing attack; Privileged administrator;
D O I
10.4304/jcp.8.12.3257-3263
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Two-factor authentication using password and smart card could reduce the risk than the use of a password alone. Recently, Chen et al. proposed a two-factor remote user authentication protocol using password and smart card and provide the criteria of authentication protocols. They claimed their protocol is secure against certain known attacks. In this paper, the authors showed that Chen et al.'s scheme is still vulnerable to the off-line password guessing attack, privileged administrator attack, key control attack and lacks of forward security. To solve these security problems, we propose an efficient two-factor authentication and key agreement protocol..
引用
收藏
页码:3257 / 3263
页数:7
相关论文
共 50 条
  • [31] Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments
    Xu, Zhiqiang
    He, Debiao
    Huang, Xinyi
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 595 - 605
  • [32] A Security Improved Remote Password Authentication Scheme using Smart Card
    Jing, Chao
    [J]. EQUIPMENT MANUFACTURING TECHNOLOGY AND AUTOMATION, PTS 1-3, 2011, 317-319 : 1791 - 1796
  • [33] A pairing-based password authentication scheme using smart card with user anonymity
    Jiang, Linmei
    Dai, Songsong
    Liu, Niansheng
    Guo, Donghui
    [J]. INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2015, 9 (01) : 12 - 22
  • [34] Two-Factor Privacy-Preserving Protocol for Efficient Authentication in Internet of Vehicles Networks
    Al Sibahee, Mustafa A.
    Nyangaresi, Vincent Omollo
    Abduljabbar, Zaid Ameen
    Luo, Chengwen
    Zhang, Jin
    Ma, Junchao
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 14253 - 14266
  • [35] AN IMPROVED REMOTE PASSWORD AUTHENTICATION SCHEME WITH SMART CARD
    Jing Chao
    [J]. JournalofElectronics(China), 2012, 29 (06) : 550 - 555
  • [36] Smart card based secure password authentication scheme
    Wang, SJ
    Chang, JF
    [J]. COMPUTERS & SECURITY, 1996, 15 (03) : 231 - 237
  • [37] Cryptanalysis of a Robust and Efficient Smart Card Oriented Remote User Authentication Protocol
    Horng, Wen-Bing
    Peng, Jian-Wen
    Liu, Chao-Sheng
    Chiu, Ying-Ching
    [J]. IEEE INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATIONS SYSTEMS (ISPACS 2012), 2012,
  • [38] Conformal Chebyshev chaotic map-based remote user password authentication protocol using smart card
    Chandrashekhar Meshram
    Sarita Gajbhiye Meshram
    Rabha W. Ibrahim
    Hamid A. Jalab
    Sajjad Shaukat Jamal
    Sharad Kumar Barve
    [J]. Complex & Intelligent Systems, 2022, 8 : 973 - 987
  • [39] Conformal Chebyshev chaotic map-based remote user password authentication protocol using smart card
    Meshram, Chandrashekhar
    Meshram, Sarita Gajbhiye
    Ibrahim, Rabha W.
    Jalab, Hamid A.
    Jamal, Sajjad Shaukat
    Barve, Sharad Kumar
    [J]. COMPLEX & INTELLIGENT SYSTEMS, 2022, 8 (02) : 973 - 987
  • [40] Machine learning and smart card based two-factor authentication scheme for preserving anonymity in telecare medical information system (TMIS)
    Gupta, B. B.
    Prajapati, Varun
    Nedjah, Nadia
    Vijayakumar, P.
    Abd El-Latif, Ahmed A.
    Chang, Xiaojun
    [J]. NEURAL COMPUTING & APPLICATIONS, 2023, 35 (07) : 5055 - 5080