Vulnerabilities in a remote agent authentication scheme using smart cards

被引:0
|
作者
Lee, Youngsook [1 ]
Nam, Junghyun [2 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Dept Comp Engn, Seoul, South Korea
[2] Konkuk Univ, Dept Comp Sci, Seoul, South Korea
关键词
distributed system; authentication scheme; smart card; impersonation attack;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Agent technology is emerging as a new software paradigm in the areas of distributed computing. The use of multiple agents is a common technique in agent-based systems. In distributed agent systems, for secure communication, the communicating agents should authenticate each other by using authentication protocols. A remote agent authentication scheme is a two-party protocol whereby an authentication server in a distributed system confirms the identity of a remote individual logging on to the server over an untrusted, open network. This paper discusses the security of Yoon et al.'s remote agent authentication scheme making use of smart cards. Yoon et al.'s scheme was proposed to solve the security problem with Hwang et al.'s authentication scheme and was claimed to provide mutual authentication between the server and the remote agent. But, unlike the claim, in Yoon et al.'s scheme, if an attacker steals some agent's smart card and extracts the information stored in the smart card, he/she can violate the authentication goal of the scheme without knowing the agent's password. We show this by mounting two attacks, a agent impersonation attack and a sever impersonation attack, on Yoon et al's scheme. In addition, in Yoon et al.'s scheme, if an attacker steals some agent's smart card and extracts the information stored in the smart card and reads U-i's login massage, he/she can violate its fundamental goal of a password security. We show this by mounting a dictionary attack on Yoon et al.'s scheme and also figure out what has gone wrong with the scheme.
引用
收藏
页码:850 / +
页数:2
相关论文
共 50 条
  • [1] A New Remote User Authentication Scheme Using Smart Cards
    Li Huiqin
    Xu Lili
    [J]. ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 205 - 208
  • [2] An improvement of remote user authentication scheme using smart cards
    Jeon, Jun-Cheol
    Kang, Byung-Heon
    Kim, Se-Min
    Lee, Wan-Soo
    Yoo, Kee-Young
    [J]. MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 416 - +
  • [3] An enhanced remote user authentication scheme using smart cards
    Awasthi, AK
    Lal, S
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 583 - 586
  • [4] Security of a remote user authentication scheme using smart cards
    Yeh, HT
    Sun, HM
    Hsieh, BT
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (01) : 192 - 194
  • [5] A remote user authentication scheme without using smart cards
    Rhee, Hyun Sook
    Kwon, Jeong Ok
    Lee, Dong Hoon
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 6 - 13
  • [6] A new remote user authentication scheme using smart cards
    Hwang, MS
    Li, LH
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) : 28 - 30
  • [7] Cryptanalysis of a remote user authentication scheme using smart cards
    Chan, CK
    Cheng, LM
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (04) : 992 - 993
  • [8] New remote user authentication scheme using smart cards
    Kumar, M
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 597 - 600
  • [9] A modified remote user authentication scheme using smart cards
    Shen, JJ
    Lin, CW
    Hwang, MS
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2003, 49 (02) : 414 - 416
  • [10] Cryptanalysis of a remote user authentication scheme using smart cards
    Huang Kai
    Ou Qingyu
    Wu Xiaoping
    Song Yexin
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4490 - 4493