Cryptanalysis and improvement of 'an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks'

被引:15
|
作者
Farash, Mohammad Sabzinejad [1 ]
机构
[1] Kharazmi Univ, Fac Math Sci & Comp, Tehran, Iran
关键词
EXCHANGE PROTOCOL; EFFICIENT; SECURE;
D O I
10.1002/nem.1883
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication schemes assure that authorised user can fraudulently obtain his/her required services from home domains. Recently, Li et al. (International Journal of Network Management, 2013; 23(5):311-324) proposed a remote user authentication scheme. They claimed that their protocol is secure against known security attacks. However, in this paper, we indicate that Li et al.'s scheme is insecure against user impersonation attack. We show that an active adversary can easily masquerade as a legitimate user without knowing the user's secret information. As a remedy, we also proposed an improved authentication scheme to overcome the security weaknesses of Li et al.'s scheme. To show the security of our scheme, we prove its security the random oracle model. The implementation results show that our improved scheme offers a reduction of 58% in computational cost and a communication cost reduction of 48% with respect to Li et al.'s scheme. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:31 / 51
页数:21
相关论文
共 50 条
  • [1] An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks
    Li, Xuelei
    Wen, Qiaoyan
    Zhang, Hua
    Jin, Zhengping
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2013, 23 (05) : 311 - 324
  • [2] Remote mutual authentication and key agreement scheme based on elliptic curve cryptosystem
    Yoon, Eun-Jun
    [J]. TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2011, 19 (03) : 335 - 347
  • [3] A SECURE AND EFFICIENT AUTHENTICATION WITH KEY AGREEMENT SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Qu, Juan
    Feng, Yuming
    Huang, Yi
    [J]. ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2015, (34): : 101 - 112
  • [4] Practical Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on Elliptic Curve Cryptosystem
    Wu, Shuhua
    Kang, Fei
    Pu, Qiong
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (03): : 411 - 418
  • [5] Two-Factor User Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem
    Qu, Juan
    Tan, Xiao-Ling
    [J]. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2014, 2014
  • [6] Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem
    Nitaj, Abderrahmane
    Susilo, Willy
    Tonien, Joseph
    [J]. PROVABLE SECURITY, PROVSEC 2019, 2019, 11821 : 206 - 221
  • [7] A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem
    Shen, Han
    Kumar, Neeraj
    He, Debiao
    Shen, Jian
    Chilamkurti, Naveen
    [J]. JOURNAL OF SUPERCOMPUTING, 2016, 72 (09): : 3588 - 3600
  • [8] An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
    Yang, Jen-Ho
    Chang, Chin-Chen
    [J]. COMPUTERS & SECURITY, 2009, 28 (3-4) : 138 - 143
  • [9] A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem
    Han Shen
    Neeraj Kumar
    Debiao He
    Jian Shen
    Naveen Chilamkurti
    [J]. The Journal of Supercomputing, 2016, 72 : 3588 - 3600
  • [10] An improved authentication key agreement protocol based on elliptic curve for wireless mobile networks
    Chang, Chin-Chen
    Chang, Shih-Chang
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1375 - 1378