Security Analysis of an Authentication Scheme Using Smart Cards

نویسندگان

  • Gaurav Tiwari
  • Amit K. Awasthi
  • Neha Shukla
چکیده

In 2010, Sood et al [3] proposed a secure dynamic identity based authentication scheme using smart cards. They claimed that their scheme is secure against various attacks. In this paper, we improve their scheme for outsider attack as well as insider attack. To remedy these security flaws, an improved scheme is proposed to withstand these attacks. [1] Introduction With the rapid increasing need of remote digital services and electronic transactions; authentication schemes that ensure secure communication through an insecure channel are gaining popularity and have been studied widely in recent years. In 1981, Lamport [4] proposed first remote user password based authentication scheme by employing a one way hash chain, in an insecure and untrusted network, but this scheme has a. That is why, Smart cards major drawbacks of its dependency on verification table. Smart cards implementation solved this problem of dependency on verification tables and ensures secure communication based authentication scheme are becoming day by day more popular. The paper is organized as follows: Section 2 reviews Sood et al's authentication scheme. Section 3 describes our proposed scheme followed by security analysis in Section 4. Finally, we conclude the paper in Section 5. [2] Phases of Sood et al's Scheme The dynamic identity based authentication scheme proposed by Sood et al in 2010, consists of four phases: registration phase, login phase, verification and session key agreement phase and password changing phase. The notations used throughout the paper are summarized below: Notations and Symbols used in paper Ui Legitimate ith user IDi Identifier of Ui PWi Password of Ui S The Server x Secret key of the server S yi Server's random value ski Session Key T Current date and time of inpute device T' Current date and time of the server S δT Expected time interval for a transmission delay H(.) Secure one way Hash Function ⊕ Bitwise Exclusively or (XOR) operation ∥ Bitwise concatenation operation [3] Our Proposed Scheme In this section, we propose an upgraded authentication scheme, that preserves the properties of Sood et al’s scheme and resolves all the identified weaknesses of their scheme and make it secure and efficient for practical applications. The scheme consists of four phases: registration phase, login phase, verification & session key agreement phase and password changing phase. [3.1] Registration When the user Ui wants to register, he chooses his identity IDi and password PWi, and send it to the server S via a secure communication channel. Then, the server S chooses random value yi for ith user and computes: Ni = H(PWi) ⊕ H(yi∥IDi) ⊕ H(x) ⊕ yi , Bi = H(yi) ⊕ H(PWi) , Vi = H(IDi∥PWi ) ⊕ PWi , Di = H(H(yi) ∥ IDi) , S chooses the value of yi, in such a way that the value of Di must be unique for each user. The server S stores (Ni, Bi, Vi, H(.)) into smart card and sends it to Ui, via a secure channel. [3.2] Login Phase The user Ui, inserts the smart card into the card reader and keys in IDi∗ and PWi∗ , then the smart card computes Vi∗ = H(IDi∗ ∥ PWi∗ ) ⊕ PWi∗ and checks whether computed Vi∗ is equal to the Vi or not. If they are equal, the requested user is the legitimate bearer of the smart card otherwise rejects the login request. To resist offline password guessing attack, the card reader locks the card if Ui enters either wrong identifier or wrong password more than limited number of times. After verifying the legality of the user, the smart card computes:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication sc...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Security Pitfalls of an efficient remote user authentication scheme using smart cards

In 2004, W. C. Ku and S. M. Chen proposed an efficient remote user authentication scheme using smart cards to solve the security problems of Chien et al.’s scheme. Recently, Hsu and Yoon et al. pointed out the security weakness of the Ku and Chen’s scheme Furthermore, Yoon et al.’s scheme also proposed a new efficient remote user authentication scheme using smart cards. This paper analyzes the ...

متن کامل

Improving the Password-Based Authentication against Smart Card Security Breach

Password-based authentications using smart cards are very necessary between login users and a remote server. Smart card security breach threatens the security of password-based authentication schemes with smart cards. A password-based authentication scheme with smart cards against smart card security breach was proposed by C.T. Li et al. recently. However, it is noted that Li et al.'s scheme ne...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Security Weaknesses and Improvements of a Fingerprint-based Remote User Authentication Scheme Using Smart Cards

Abstract Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2006, Khan et al.[12] proposed an improved fingerprint-based remote user authentication scheme using smart cards that is achieved mutual authentication between the user and the server, while eliminating the drawback of Lee...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2014  شماره 

صفحات  -

تاریخ انتشار 2014