Cryptanalysis of Yeh et al.'s Security-Enhanced Remote User Authentication Scheme with Smart Cards

被引:0
|
作者
Shieh, Wen-Gong [1 ]
Horng, Wen-Bing [2 ]
机构
[1] Chinese Culture Univ, Dept Informat Management, Taipei 111, Taiwan
[2] Tamkang Univ, Dept Comp Sci & Informat Engn, Tamsui 251, Taiwan
来源
关键词
Authentication; Cryptanalysis; Probing Analysis Attack; Security; Smart Card;
D O I
10.6180/jase.2013.16.3.11
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Remote authentication is an essential part of the rapid-growing electronic commerce. Recently, Huang and Wei proposed a complete authentication scheme using smart cards with only lightweight operations, such as exclusive-or operations, secure one-way hash functions, and pseudo-random number generators. However, Yeh et al. indicated that Huang-Wei's scheme is vulnerable to the probing analysis attack and then presented a security-enhanced scheme. In this paper, we will show that Yeh et al.' s enhanced scheme suffers from two different kinds of attacks. First, Yeh et al.'s scheme is also vulnerable to two different types of probing analysis attacks. Second, their scheme is susceptible to the user impersonation attack. Moreover, we also develop the mathematical backgrounds for these two types of probing analysis attacks, which can be used by the authentication protocol designers to avoid such kind of attacks.
引用
收藏
页码:319 / 328
页数:10
相关论文
共 50 条
  • [1] Cryptanalysis of Wang et al.'s remote user authentication scheme using smart cards
    Yoon, Eun-Jun
    Lee, Eun-Jung
    Yoo, Kee-Young
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 575 - +
  • [2] Security of Chien et al.'s remote user authentication scheme using smart cards
    Hsu, CL
    COMPUTER STANDARDS & INTERFACES, 2004, 26 (03) : 167 - 169
  • [3] Security improvement on Chien et al.'s remote user authentication scheme using smart cards
    Duan, Xiaoyi
    Liu, JianWei
    Zhang, Qishan
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1133 - 1135
  • [4] Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card
    Kumari, Saru
    Gupta, Mridul K.
    Kumar, Manoj
    OPEN COMPUTER SCIENCE, 2012, 2 (01): : 60 - 75
  • [5] Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards
    WANG DingMA Chunguang College of Computer Science and TechnologyHarbin Engineering UniversityHarbin China Automobile Management Institute of PLABengbu China
    The Journal of China Universities of Posts and Telecommunications, 2012, 19 (05) : 104 - 114
  • [7] Improvement of Chien et al.'s remote user authentication scheme using smart cards
    Lee, SW
    Kim, HS
    Yoo, KY
    COMPUTER STANDARDS & INTERFACES, 2005, 27 (02) : 181 - 183
  • [8] Cryptanalysis of a remote user authentication scheme using smart cards
    Huang Kai
    Ou Qingyu
    Wu Xiaoping
    Song Yexin
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4490 - 4493
  • [9] Cryptanalysis of a remote user authentication scheme using smart cards
    Chan, CK
    Cheng, LM
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (04) : 992 - 993
  • [10] Cryptanalysis of a user friendly remote authentication scheme with smart cards
    Yang, CC
    Wang, RC
    COMPUTERS & SECURITY, 2004, 23 (05) : 425 - 427