Cryptanalysis of Yeh et al.'s Security-Enhanced Remote User Authentication Scheme with Smart Cards

被引:0
|
作者
Shieh, Wen-Gong [1 ]
Horng, Wen-Bing [2 ]
机构
[1] Chinese Culture Univ, Dept Informat Management, Taipei 111, Taiwan
[2] Tamkang Univ, Dept Comp Sci & Informat Engn, Tamsui 251, Taiwan
来源
关键词
Authentication; Cryptanalysis; Probing Analysis Attack; Security; Smart Card;
D O I
10.6180/jase.2013.16.3.11
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Remote authentication is an essential part of the rapid-growing electronic commerce. Recently, Huang and Wei proposed a complete authentication scheme using smart cards with only lightweight operations, such as exclusive-or operations, secure one-way hash functions, and pseudo-random number generators. However, Yeh et al. indicated that Huang-Wei's scheme is vulnerable to the probing analysis attack and then presented a security-enhanced scheme. In this paper, we will show that Yeh et al.' s enhanced scheme suffers from two different kinds of attacks. First, Yeh et al.'s scheme is also vulnerable to two different types of probing analysis attacks. Second, their scheme is susceptible to the user impersonation attack. Moreover, we also develop the mathematical backgrounds for these two types of probing analysis attacks, which can be used by the authentication protocol designers to avoid such kind of attacks.
引用
收藏
页码:319 / 328
页数:10
相关论文
共 50 条
  • [31] Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
    State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    J Network Comput Appl, 1 (73-79):
  • [32] Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards
    He, Debiao
    Wang, Ding
    Wu, Shuhua
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (02): : 170 - 177
  • [33] Cryptanalysis and improvement of Chen-Hsiang-Shih's remote user authentication scheme using smart cards
    Martinez-Pelaez, Rafael
    Rico-Novella, Francisco
    Velarde-Alvarado, Pablo
    REVISTA FACULTAD DE INGENIERIA-UNIVERSIDAD DE ANTIOQUIA, 2013, (68): : 27 - 35
  • [34] An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards
    Li, Chun-Ta
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 517 - 520
  • [35] Security Enhancement on an Improvement on Two Remote User Authentication Scheme Using Smart Cards
    Hsiang, HanCheng
    Chen, TienHo
    Shih, WeiKuan
    COMMUNICATION AND NETWORKING, 2009, 56 : 65 - +
  • [36] Security Enhancement on the Efficient and Complete Remote User Authentication Scheme using smart Cards
    Lee, Young Sil
    Kim, Tae Yong
    Lee, Hoon Jae
    2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 702 - 706
  • [37] Security analysis and improvement of the remote user authentication scheme without using smart cards
    Shieh, Wen-Gong
    Horng, Wen-Bing
    ICIC Express Letters, 2010, 4 (6 B): : 2431 - 2436
  • [38] Cryptanalysis of Security Analysis and Enhancements of a Remote User Authentication Scheme
    Hwang, Min-Shiang
    Yang, Hung-Wei
    Yang, Cheng-Ying
    3RD ANNUAL INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING, 2020, 719
  • [39] A New Remote User Authentication Scheme Using Smart Cards
    Li Huiqin
    Xu Lili
    ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 205 - 208
  • [40] An improvement of remote user authentication scheme using smart cards
    Jeon, Jun-Cheol
    Kang, Byung-Heon
    Kim, Se-Min
    Lee, Wan-Soo
    Yoo, Kee-Young
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 416 - +