Cryptanalysis and Improvement of Jiang et al.'s Smart Card Based Remote User Authentication Scheme

نویسندگان

  • Dheerendra Mishra
  • Ankita Chaturvedi
  • Sourav Mukhopadhyay
چکیده

Smart card based remote user password authentication schemes are one of the user-friendly and scalable mechanism to establish secure communication between remote entities. These schemes try to ensure secure and authorized communication between remote entities over the insecure public network. Although, most of the existing schemes do not satisfy desirable attributes, such that resistance against attacks, user anonymity and efficiency. In 2012, Chen et al. proposed a robust smart cased based remote user authentication scheme to erase the weaknesses of Sood et al.’s scheme. Recently, Jiang et al. showed that Chen et al.’s scheme is vulnerable to password guessing attack. Furthermore, Jiang et al. presented a solution to overcome the shortcoming of Chen et al.’s scheme. In the paper, we show that Jiang et al.’s scheme is still vulnerable to insider attack, on-line and off-line password guessing attack and user impersonation attack. Their scheme also fails to ensure perfect forward secrecy and user’s anonymity. Moreover, It does not provide efficient login and user-friendly password change phase. Further, to overcome these drawbacks, we present a modify scheme which reduces the computation overhead and satisfies all desirable security attributes where Jiang et al.’s scheme failed. keywords: Smart card; Password based authentication; Cryptanalysis; Anonymity.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of Sun and Cao's Remote Authentication Scheme with User Anonymity

Dynamic ID-based remote user authentication schemes ensure efficient and anonymous mutual authentication between entities. In 2013, Khan et al. proposed an improved dynamic ID-based authentication scheme to overcome the security flaws of Wang et al.’s authentication scheme. Recently, Sun and Cao showed that Khan et al. does not satisfies the claim of the user’s privacy. Moreover, They proposed ...

متن کامل

Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System

A three-factor authentication combines biometrics information with user password and smart card to provide security-enhanced user authentication. An proposed user authentication scheme improved Das’s scheme. But An’s scheme is not secure against denial of service attack in login phase, forgery attack. Li et al. pointed out them and proposed three-factor remote user authentication scheme with ke...

متن کامل

A Secure Remote Authentication Scheme Preserving User Anonymity with Non-Tamper Resistant Smart Cards

Anonymity is one of the important properties of remote authentication schemes to preserve user privacy. Besides, it can avoid unauthorized entities from using the user ID and other intercepted information to forge legal login messages. In 2004, Das et al. first proposed a remote user authentication scheme with smart cards using dynamic ID to protect user anonymity. Later, in 2005, Chien and Che...

متن کامل

Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards

Recently, Li et al. proposed a secure biometric-based remote user authentication scheme using smart cards to withstand the security flaws of Li-Hwang’s efficient biometric-based remote user authentication scheme using smart cards. Li et al.’s scheme is based on biometrics verification, smart card and one-way hash function, and it also uses the random nonce rather than a synchronized clock, and ...

متن کامل

Cryptanalysis and Security Enhancement of Two Advanced Authentication Protocols

In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Jiang et al., is a password-based authentication scheme which does not use smart cards. We note that this scheme is an improvement over Chen et al.’s scheme shown vulnerable to the off-line dictionary attack by Jiang et al. We perform a cryptanalysis on Jiang at al.’s improved protocol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1312.4793  شماره 

صفحات  -

تاریخ انتشار 2013