Cryptanalysis of Yeh et al.'s Security-Enhanced Remote User Authentication Scheme with Smart Cards

被引:0
|
作者
Shieh, Wen-Gong [1 ]
Horng, Wen-Bing [2 ]
机构
[1] Chinese Culture Univ, Dept Informat Management, Taipei 111, Taiwan
[2] Tamkang Univ, Dept Comp Sci & Informat Engn, Tamsui 251, Taiwan
来源
关键词
Authentication; Cryptanalysis; Probing Analysis Attack; Security; Smart Card;
D O I
10.6180/jase.2013.16.3.11
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Remote authentication is an essential part of the rapid-growing electronic commerce. Recently, Huang and Wei proposed a complete authentication scheme using smart cards with only lightweight operations, such as exclusive-or operations, secure one-way hash functions, and pseudo-random number generators. However, Yeh et al. indicated that Huang-Wei's scheme is vulnerable to the probing analysis attack and then presented a security-enhanced scheme. In this paper, we will show that Yeh et al.' s enhanced scheme suffers from two different kinds of attacks. First, Yeh et al.'s scheme is also vulnerable to two different types of probing analysis attacks. Second, their scheme is susceptible to the user impersonation attack. Moreover, we also develop the mathematical backgrounds for these two types of probing analysis attacks, which can be used by the authentication protocol designers to avoid such kind of attacks.
引用
收藏
页码:319 / 328
页数:10
相关论文
共 50 条
  • [21] An enhanced remote user authentication scheme using smart cards
    Awasthi, AK
    Lal, S
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 583 - 586
  • [22] Security Improvement on a Remote User Authentication Scheme Using Smart Cards
    Chen, Tien-Ho
    Hsiang, Han-Cheng
    Shih, Wei-Kuan
    INFORMATION SECURITY AND ASSURANCE, 2010, 76 : 9 - +
  • [23] Security enhancement of a remote user authentication scheme using smart cards
    Lee, Youngsook
    Nam, Junghyun
    Won, Dongho
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 508 - +
  • [24] Cryptanalysis of a fingerprint-based remote user authentication scheme using smart cards
    Hsieh, BT
    Yeh, HT
    Sun, HM
    Lin, CT
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 349 - 350
  • [25] Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
    Wang, Xiao-Min
    Zhang, Wen-Fang
    Zhang, Jia-Shu
    Khan, Muhammad Khurram
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (05) : 507 - 512
  • [26] An Improvement of Liao et al.'s Authentication Scheme using Smart Cards
    Sood, Sandeep K.
    Sarje, Anil K.
    Singh, Kuldip
    2010 IEEE 2ND INTERNATIONAL ADVANCE COMPUTING CONFERENCE, 2010, : 240 - 245
  • [27] Cryptanalysis of a Remote User Authentication Protocol Using Smart Cards
    Madhusudhan, R.
    Kumar, Rohith S.
    2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, : 474 - 477
  • [28] Cryptanalysis of Kumar's Remote User Authentication Scheme with Smart Card
    Hwang, Min-Shiang
    Cahyadi, Eko Fajar
    Chou, Yuen-Cheng
    Yang, Cheng-Ying
    2018 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2018, : 416 - 420
  • [29] Cryptanalysis and improvement of an enhanced smart card based remote user authentication scheme
    Xu, C. (cbqysy@gmail.com), 1600, Binary Information Press (10):
  • [30] Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
    Li, Xiong
    Niu, Jian-Wei
    Ma, Jian
    Wang, Wen-Dong
    Liu, Cheng-Lian
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (01) : 73 - 79