Attacks and Solutions on the Quan et al.'s Smart Card Based Remote User Authentication with a Key Agreement Scheme

被引:1
|
作者
Chen, Chien-ming [1 ]
Huang, Yanyu [1 ]
Deng, Xiaoting [1 ]
Xiang, Bin [1 ]
Wu, Tsu-yang [2 ,3 ]
机构
[1] Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen, Peoples R China
[2] Fujian Univ Technol, Fujian Prov Key Lab Big Data Min & Applicat, Fuzhou 350118, Fujian, Peoples R China
[3] Fujian Univ Technol, Natl Demonstrat Ctr Expt Elect Informat & Elect T, Fuzhou 350118, Fujian, Peoples R China
关键词
SECURITY; PROTOCOL;
D O I
10.1088/1742-6596/1069/1/012069
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, Quan et al. proposed a smart card based user authentication scheme to conquer the existing defects in An's scheme. In their paper, they claimed that their proposed scheme could resist various attacks. However, by analysing their scheme, we demonstrate that it still suffers from a traceable attack and an off-line password guessing attack. To erase the weaknesses and enhance the security, we then suggest some modification in their scheme. Compared with Quan et al.'s and other related schemes, our modified one performs better in terms of security.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card
    Kumari, Saru
    Gupta, Mridul K.
    Kumar, Manoj
    OPEN COMPUTER SCIENCE, 2012, 2 (01): : 60 - 75
  • [2] A smart card based remote user authentication scheme
    Centre for Development of Advanced Computing, 68, Electronic City, Bangalore, India
    不详
    不详
    J. Digit. Inf. Manage., 2008, 3 (256-261):
  • [3] Security Enhancements of Smart Card-Based Remote User Password Authentication Scheme with Session Key Agreement
    An, Young-Hwa
    2015 17TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2015, : 669 - 674
  • [4] Improvement of Chien et al.'s remote user authentication scheme using smart cards
    Lee, SW
    Kim, HS
    Yoo, KY
    COMPUTER STANDARDS & INTERFACES, 2005, 27 (02) : 181 - 183
  • [5] Cryptanalysis of Wang et al.'s remote user authentication scheme using smart cards
    Yoon, Eun-Jun
    Lee, Eun-Jung
    Yoo, Kee-Young
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 575 - +
  • [6] Security of Chien et al.'s remote user authentication scheme using smart cards
    Hsu, CL
    COMPUTER STANDARDS & INTERFACES, 2004, 26 (03) : 167 - 169
  • [7] Cryptanalysis of Vaidya et al.'s User Authentication Scheme with Key Agreement in Wireless Sensor Networks
    Li Jiping
    Ding Yaoming
    Xiong Zenggang
    Liu Shouyin
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 619 - 623
  • [8] An Improvement of Sood, et al. 's Authentication Scheme using Smart Card
    Shin, Kwang Cheul
    Cho, Jung Gil
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 271 - 281
  • [9] An enhanced biometrics-key-based remote user authentication scheme with smart card
    Xu, Qingui
    Huang, Peican
    Yang, Taolan
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (11): : 2645 - 2655
  • [10] Attacks to Li et al.'s Billing Service User Authentication Scheme
    Shieh, Wen-Gong
    Wang, Mei-Tzu
    MATERIALS, MECHANICAL ENGINEERING AND MANUFACTURE, PTS 1-3, 2013, 268-270 : 1762 - 1767