Security Improvement on Smart card-based Remote User Authentication Scheme using Hash Function

被引:0
|
作者
Kim, Youngil [1 ]
Choi, Younsung [1 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Coll Informat & Commun Engn, Suwon, South Korea
关键词
smart card; remote user authentication; password guessing attack; insider attack; stolen verifier attack; security; EFFICIENT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 2012, Sonwanshi et al. proposed an efficient smart card based remote user authentication scheme using hash function. They claimed that the scheme resists most current possible attacks. However, in the following year, Das et al. found that Sonwanshi et al.'s scheme is vulnerable to offline password guessing attack. In this paper, we point out that there exist additional security defects such as impersonation attack, insider attack, and vulnerabilities for shared session key, absence of the revocation phase in Sonwanshi et al.'s scheme. Furthermore, we propose an improved scheme that preserves the similar properties and resolves all such security flaws.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] A Random Increasing Sequence Hash Chain and Smart Card-Based Remote User Authentication Scheme
    Fan, Jian-Wei
    Chan, Chao-Wen
    Chang, Ya-Fen
    [J]. 2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,
  • [2] Security Enhancements of Smart Card-Based Remote User Password Authentication Scheme with Session Key Agreement
    An, Young-Hwa
    [J]. 2015 17TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2015, : 669 - 674
  • [3] A smart card-based authentication scheme using user identify cryptography
    [J]. Chang, C.-C. (ccc@cs.ccu.edu.tw), 1600, Femto Technique Co., Ltd. (15):
  • [4] More secure smart card-based remote user password authentication scheme with user anonymity
    Kumari, Saru
    Khan, Muhammad Khurram
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2039 - 2053
  • [5] Security Analysis of a Remote User Authentication Scheme Using Smart Card
    Zhu, Canyan
    Zhang, Lihua
    [J]. 2008 INTERNATIONAL CONFERENCE ON NEURAL NETWORKS AND SIGNAL PROCESSING, VOLS 1 AND 2, 2007, : 133 - +
  • [6] An Improvement of Encrypted Remote User Authentication Scheme by Using Smart Card
    Mun, Jongho
    Kim, Jiye
    Jeon, Woongryul
    Lee, Youngsook
    Won, Dongho
    [J]. MULTIMEDIA AND UBIQUITOUS ENGINEERING, 2014, 308 : 451 - 458
  • [7] Cryptanalysis and Improvement of Remote User Authentication Scheme Using Smart Card
    Madhusudhan, R.
    Hegde, Manjunath
    [J]. PROCEEDINGS OF 6TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE 2016), 2016, : 84 - 89
  • [8] Cryptanalysis of a smart card-based remote authentication scheme with anonymity
    School of Computer Science and Technology, Huazhong University of Science and Technology, Hongshan Distract, Wuhan City, Hubei
    430074, China
    [J]. J. Comput. Theor. Nanosci, 11 (4778-4784):
  • [9] Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card
    Amin, Ruhul
    Maitra, Tanmoy
    Giri, Debasis
    Srivastava, P. D.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (03) : 4629 - 4659
  • [10] Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card
    Ruhul Amin
    Tanmoy Maitra
    Debasis Giri
    P. D. Srivastava
    [J]. Wireless Personal Communications, 2017, 96 : 4629 - 4659