Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'

被引:173
作者
Khan, Muhammad Khurram [1 ]
Kim, Soo-Kyun [2 ]
Alghathbar, Khaled [1 ,3 ]
机构
[1] King Saud Univ, Ctr Excellence Informat Assurance CoEIA, Riyadh 11451, Saudi Arabia
[2] PaiChai Univ, Dept Game Engn, Taejon, South Korea
[3] King Saud Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh 11451, Saudi Arabia
关键词
Authentication; Security; Smart card; Cryptanalysis; Password; PASSWORD AUTHENTICATION;
D O I
10.1016/j.comcom.2010.02.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Remote user authentication is a method, in which remote server verifies the legitimacy of a user over an insecure communication channel. Currently, smart card-based remote user authentication schemes have been widely adopted due to their low computational cost and convenient portability for the authentication purpose. Recently, Wang et al. proposed a dynamic ID-based remote user authentication scheme using smart cards. They claimed that their scheme preserves anonymity of user, has the features of strong password chosen by the server, and protected from several attacks. However, in this paper, we point out that Wang et al.'s scheme has practical pitfalls and is not feasible for real-life implementation. We identify that their scheme: does not provide anonymity of a user during authentication, user has no choice in choosing his password, vulnerable to insider attack, no provision for revocation of lost or stolen smart card, and does provide session key agreement. To remedy these security flaws, we propose an enhanced authentication scheme, which covers all the identified weaknesses of Wang et al.'s scheme and is more secure and efficient for practical application environment. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:305 / 309
页数:5
相关论文
共 28 条
[1]  
Awasthi A. K., 2004, T CRYPTOLOGY, V1, P15
[2]  
Chang CC, 2003, INFORMATICA-LITHUAN, V14, P289
[3]  
Cheng-Chi Lee, 2002, Operating Systems Review, V36, P46, DOI 10.1145/567331.567335
[4]  
CHIEN HY, 2005, INT C AINA 05, V2, P2005
[5]   A dynamic ID-based remote user authentication scheme [J].
Das, ML ;
Saxena, A ;
Gulati, VP .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :629-631
[6]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[7]   Robust remote authentication scheme with smart cards [J].
Fan, CI ;
Chan, YC ;
Zhang, ZK .
COMPUTERS & SECURITY, 2005, 24 (08) :619-628
[8]   Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment [J].
Hsiang, Han-Cheng ;
Shih, Wei-Kuan .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) :1118-1123
[9]  
Hsu CL, 2004, COMP STAND INTER, V26, P167, DOI [10.1016/S0920-5489(03)00094-1, 10.1016/s0920-5489(03)00094-1]
[10]   A new remote user authentication scheme using smart cards [J].
Hwang, MS ;
Li, LH .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) :28-30