Cryptanalysis of Yeh et al.'s Security-Enhanced Remote User Authentication Scheme with Smart Cards

被引:0
|
作者
Shieh, Wen-Gong [1 ]
Horng, Wen-Bing [2 ]
机构
[1] Chinese Culture Univ, Dept Informat Management, Taipei 111, Taiwan
[2] Tamkang Univ, Dept Comp Sci & Informat Engn, Tamsui 251, Taiwan
来源
关键词
Authentication; Cryptanalysis; Probing Analysis Attack; Security; Smart Card;
D O I
10.6180/jase.2013.16.3.11
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Remote authentication is an essential part of the rapid-growing electronic commerce. Recently, Huang and Wei proposed a complete authentication scheme using smart cards with only lightweight operations, such as exclusive-or operations, secure one-way hash functions, and pseudo-random number generators. However, Yeh et al. indicated that Huang-Wei's scheme is vulnerable to the probing analysis attack and then presented a security-enhanced scheme. In this paper, we will show that Yeh et al.' s enhanced scheme suffers from two different kinds of attacks. First, Yeh et al.'s scheme is also vulnerable to two different types of probing analysis attacks. Second, their scheme is susceptible to the user impersonation attack. Moreover, we also develop the mathematical backgrounds for these two types of probing analysis attacks, which can be used by the authentication protocol designers to avoid such kind of attacks.
引用
收藏
页码:319 / 328
页数:10
相关论文
共 50 条
  • [41] A note on a user friendly remote authentication scheme with smart cards
    Wu, ST
    Chieu, BC
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (08): : 2180 - 2181
  • [42] A remote user authentication scheme without using smart cards
    Rhee, Hyun Sook
    Kwon, Jeong Ok
    Lee, Dong Hoon
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 6 - 13
  • [43] A new remote user authentication scheme using smart cards
    Hwang, MS
    Li, LH
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) : 28 - 30
  • [44] New remote user authentication scheme using smart cards
    Kumar, M
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 597 - 600
  • [45] A new secure remote user authentication scheme with smart cards
    Kumar, Manoj
    International Journal of Network Security, 2010, 11 (02) : 88 - 93
  • [46] A modified remote user authentication scheme using smart cards
    Shen, JJ
    Lin, CW
    Hwang, MS
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2003, 49 (02) : 414 - 416
  • [47] An Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards
    Lu, Jian-Zhu
    Chen, Ting
    Zhou, Jipeng
    Yang, Jinjin
    Jiang, Junhui
    2013 6TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), VOLS 1-3, 2013, : 1643 - 1648
  • [48] Strong Remote User Authentication Scheme using Smart Cards
    Martinez-Pelaez, Rafael
    Rico-Novella, Francisco
    Satizabal, Cristina
    Pomykala, Jacek
    PROCEEDINGS OF THE 8TH INTERNATIONAL NETWORK CONFERENCE (INC 2010), 2010, : 199 - 208
  • [49] Cryptanalysis of Vaidya et al.'s User Authentication Scheme with Key Agreement in Wireless Sensor Networks
    Li Jiping
    Ding Yaoming
    Xiong Zenggang
    Liu Shouyin
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 619 - 623
  • [50] Attacks and Solutions on the Quan et al.'s Smart Card Based Remote User Authentication with a Key Agreement Scheme
    Chen, Chien-ming
    Huang, Yanyu
    Deng, Xiaoting
    Xiang, Bin
    Wu, Tsu-yang
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069