Security analysis of 'an improved low computation cost user authentication scheme for mobile communication'

被引:0
|
作者
Khan, Muhammad Khurram [1 ]
Zhang, Jiashu [1 ]
机构
[1] SW Jiao Tong Univ, Sichuan Key Lab Signal & Informat PRocessing, Res Grp Biometr & Secur, Chengdu 610031, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, Lee et al. proposed 'an improved low computation cost user authentication scheme for mobile communication'. We demonstrate that their scheme is vulnerable and susceptible to the attacks and can be easily cryptanalyzed. We point out that their scheme performs unilateral'authentication (only client authentication) and there is no mutual authentication between user and remote system, so their scheme suscepts from the server spoofing attack. Furthermore, an adversary can impersonate legitimate users by copying data of their stolen or lost smart card. Moreover, Lee et al.'s scheme is poorly reparable, which makes their method infeasible to implement.
引用
收藏
页码:276 / 279
页数:4
相关论文
共 50 条
  • [1] An improved low computation cost user authentication scheme for mobile communication
    Lee, CY
    Lin, CH
    Chang, CC
    AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, 2005, : 249 - 252
  • [2] Security enhancement for a low computation cost user authentication scheme
    Sattarzadeh, Behnam
    Asadpour, Mahdi
    Jalili, Rasool
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 5 - +
  • [3] Security Analysis and Enhancements of a User Authentication Scheme
    Liu, Wan-Rong
    He, Xin
    Ji, Zhi-Yong
    International Journal of Network Security, 2021, 23 (05): : 895 - 903
  • [4] An improved authentication scheme for mobile satellite communication systems
    Zhang, Yuanyuan
    Chen, Jianhua
    Huang, Baojun
    INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2015, 33 (02) : 135 - 146
  • [5] Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Xiong, Hu
    Wang, Xiaofeng
    Li, Fagen
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 256 - 258
  • [6] Security analysis and enhancements of a remote user authentication scheme
    Cao, Shou-Qi
    Sun, Qing
    Cao, Li-Ling
    International Journal of Network Security, 2019, 21 (04) : 661 - 669
  • [7] Security analysis of practical anonymous user authentication scheme with security proof
    Liu, Chenglian
    Lin, Changlu
    Sun, Shuliang
    Information Technology Journal, 2013, 12 (03) : 522 - 525
  • [8] Security Enhancement of an Improved Remote User Authentication Scheme with Key Agreement
    Kaul, Sonam Devgan
    Awasthi, Amit K.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (02) : 621 - 637
  • [9] Security Enhancement of an Improved Remote User Authentication Scheme with Key Agreement
    Sonam Devgan Kaul
    Amit K. Awasthi
    Wireless Personal Communications, 2016, 89 : 621 - 637
  • [10] Cryptanalysis of Security Analysis and Enhancements of a Remote User Authentication Scheme
    Hwang, Min-Shiang
    Yang, Hung-Wei
    Yang, Cheng-Ying
    3RD ANNUAL INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING, 2020, 719