Security Improvement on Smart card-based Remote User Authentication Scheme using Hash Function

被引:0
|
作者
Kim, Youngil [1 ]
Choi, Younsung [1 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Coll Informat & Commun Engn, Suwon, South Korea
关键词
smart card; remote user authentication; password guessing attack; insider attack; stolen verifier attack; security; EFFICIENT;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 2012, Sonwanshi et al. proposed an efficient smart card based remote user authentication scheme using hash function. They claimed that the scheme resists most current possible attacks. However, in the following year, Das et al. found that Sonwanshi et al.'s scheme is vulnerable to offline password guessing attack. In this paper, we point out that there exist additional security defects such as impersonation attack, insider attack, and vulnerabilities for shared session key, absence of the revocation phase in Sonwanshi et al.'s scheme. Furthermore, we propose an improved scheme that preserves the similar properties and resolves all such security flaws.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] Advance remote user authentication scheme using smart card
    Kumar S.
    Singh V.
    Sharma V.
    Singh V.P.
    [J]. Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2019, 78 (12): : 957 - 971
  • [22] A ROBUST REMOTE USER AUTHENTICATION SCHEME USING SMART CARD
    Li, Chun-Ta
    Lee, Cheng-Chi
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2011, 40 (03): : 236 - 245
  • [23] Security Vulnerabilities of User Authentication Scheme Using Smart Card
    Pippal, Ravi Singh
    Jaidhar, C. D.
    Tapaswi, Shashikala
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 106 - 113
  • [24] A Modified Remote User Authentication Scheme using Smart Card based on ECDLP
    Jena, Debasish
    Panigrahy, Saroj Kumar
    Jena, Sanjay Kumar
    Pani, Subhendu Kumar
    [J]. 2009 INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS, 2009, : 22 - +
  • [25] A Novel Remote User Authentication Scheme using Smart Card based on ECDLP
    Jena, Debasish
    Jena, Sanjay Kumar
    Mohanty, Debashisa
    Panigrahy, Saroj Kumar
    [J]. INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 246 - 249
  • [26] A Robust Remote User Authentication Scheme against Smart Card Security Breach
    Li, Chun-Ta
    Lee, Cheng-Chi
    Liu, Chen-Ju
    Lee, Chin-Wen
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXV, 2011, 6818 : 231 - 238
  • [27] Security Weaknesses of Li's Remote User Password Authentication Scheme Using Smart Card
    Ling, Jie
    Zhao, Guang-Qiang
    Liu, Yi
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 677 - 681
  • [28] Security analysis and improvement of the remote user authentication scheme without using smart cards
    Shieh, Wen-Gong
    Horng, Wen-Bing
    [J]. ICIC Express Letters, 2010, 4 (6 B): : 2431 - 2436
  • [29] Security Enhancement on an Improvement on Two Remote User Authentication Scheme Using Smart Cards
    Hsiang, HanCheng
    Chen, TienHo
    Shih, WeiKuan
    [J]. COMMUNICATION AND NETWORKING, 2009, 56 : 65 - +
  • [30] Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'
    Kumari, Saru
    Khan, Muhammad Khurram
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 3939 - 3955