Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol

被引:30
|
作者
Xie, Qi [1 ]
Dong, Na [1 ]
Wong, Duncan S. [2 ]
Hu, Bin [1 ]
机构
[1] Hangzhou Normal Univ, Sch Informat Sci & Engn, 16 Xuelin St, Hangzhou 310036, Zhejiang, Peoples R China
[2] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
authentication protocol; key agreement; smart card; password; ProVerif; IMPROVEMENT; SCHEME;
D O I
10.1002/dac.2858
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Two-factor user authentication scheme allows a user to use a smart card and a password to achieve mutual authentication and establish a session key between a server and a user. In 2012, Chen et al. showed that the scheme of Sood et al. does not achieve mutual authentication and is vulnerable to off-line password guessing and smart card stolen attacks. They also found that another scheme proposed by Song is vulnerable to similar off-line password guessing and smart card stolen attacks. They further proposed an improved scheme. In this paper, we first show that the improved scheme of Chen et al. still suffers from off-line password guessing and smart card stolen attacks, does not support perfect forward secrecy, and lacks the fairness of session key establishment. We then propose a new security-enhanced scheme and show its security and authentication using the formal verification tool ProVerif, which is based on applied pi calculus. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:478 / 487
页数:10
相关论文
共 50 条
  • [1] User-centric Two-factor Authentication Key Agreement Protocol
    Yang, Xue
    Liu, Yi-Jing
    Jiang, Qi
    Wang, Jin-Hua
    Li, Xing-Hua
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (10): : 4859 - 4875
  • [2] Robust two-factor authentication and key agreement preserving user privacy
    Jiang, Qi
    Ma, Jianfeng
    Li, Guangsong
    Yang, Li
    International Journal of Network Security, 2014, 16 (03) : 229 - 240
  • [3] On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Hamed Arshad
    Vahid Teymoori
    Morteza Nikooghadam
    Hassan Abbassi
    Journal of Medical Systems, 2015, 39
  • [4] On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Arshad, Hamed
    Teymoori, Vahid
    Nikooghadam, Morteza
    Abbassi, Hassan
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (08)
  • [5] Improvement of a security enhanced one-time two-factor authentication and key agreement scheme
    Xie, Qi
    SCIENTIA IRANICA, 2012, 19 (06) : 1856 - 1860
  • [6] Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks
    Kim, Jiye
    Lee, Donghoon
    Jeon, Woongryul
    Lee, Youngsook
    Won, Dongho
    SENSORS, 2014, 14 (04): : 6443 - 6462
  • [7] Cryptanalysis of Kim Jiye et al.’s two-factor mutual authentication with key agreement in WSNs
    Li J.
    Ding Y.
    Xiong Z.
    Liu S.
    Li H.
    Ding, Yaoming (xgdym2015@aliyun.com), 1600, Engineering and Technology Publishing (11) : 58 - 63
  • [9] Cryptanalysis and Security Improvements of 'Two-Factor User Authentication in Wireless Sensor Networks'
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    SENSORS, 2010, 10 (03) : 2450 - 2459
  • [10] Cryptanalysis of enhancement for simple authentication key agreement algorithm
    Hsieh, BT
    Sun, HM
    Hwang, T
    ELECTRONICS LETTERS, 2002, 38 (01) : 20 - 21