Security analysis of 'an improved low computation cost user authentication scheme for mobile communication'

被引:0
|
作者
Khan, Muhammad Khurram [1 ]
Zhang, Jiashu [1 ]
机构
[1] SW Jiao Tong Univ, Sichuan Key Lab Signal & Informat PRocessing, Res Grp Biometr & Secur, Chengdu 610031, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, Lee et al. proposed 'an improved low computation cost user authentication scheme for mobile communication'. We demonstrate that their scheme is vulnerable and susceptible to the attacks and can be easily cryptanalyzed. We point out that their scheme performs unilateral'authentication (only client authentication) and there is no mutual authentication between user and remote system, so their scheme suscepts from the server spoofing attack. Furthermore, an adversary can impersonate legitimate users by copying data of their stolen or lost smart card. Moreover, Lee et al.'s scheme is poorly reparable, which makes their method infeasible to implement.
引用
收藏
页码:276 / 279
页数:4
相关论文
共 50 条
  • [31] An interactive and secure user authentication scheme for mobile devices
    Sun, Qibin
    Li, Zhi
    Jiang, Xudong
    Kot, Alex
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, : 2973 - +
  • [32] A Remote User Authentication Scheme with Anonymity for Mobile Devices
    Shin, Soobok
    Kim, Kangseok
    Kim, Ki-Hyung
    Yeh, Hongjin
    INTERNATIONAL JOURNAL OF ADVANCED ROBOTIC SYSTEMS, 2012, 9
  • [33] An anonymous and provably secure authentication scheme for mobile user
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Amin, Ruhul
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (09) : 1529 - 1544
  • [34] Security and Efficient Authentication Scheme for Mobile Edge Computing
    Xue J.-B.
    Bai Z.-M.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2021, 44 (01): : 110 - 116
  • [35] On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks
    Lu, Jian-zhu
    Zhou, Jipeng
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [36] An Improved User Authentication and Key Agreement Scheme Providing User Anonymity
    Ya-Fen Chang and Pei-Yu Chang Department of Computer Science and Information Engineering
    Journal of Electronic Science and Technology, 2011, 9 (04) : 352 - 358
  • [37] An Improved User Authentication Scheme for Wireless Mesh Networks
    Cui Xinchun
    Wang Xinheng
    2009 IEEE INTERNATIONAL SYMPOSIUM ON IT IN MEDICINE & EDUCATION, VOLS 1 AND 2, PROCEEDINGS, 2009, : 915 - 918
  • [38] An improved simple user authentication scheme for grid computing
    Lee, Cheng-Chi
    Ko, Hsien-Ju
    Chen, Shun-Der
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2012, 15 (2-3): : 113 - 124
  • [39] An improved remote user authentication scheme with key agreement
    Kumari, Saru
    Khan, Muhammad Khurram
    Li, Xiong
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (06) : 1997 - 2012
  • [40] Cryptanalysis on Improved Remote User Authentication Scheme Preserving User Anonymity
    Lee, Sung-Woon
    Kwon, Hyuck-Jin
    Kim, Hyun-Sung
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (10): : 21 - 24