Security analysis of 'an improved low computation cost user authentication scheme for mobile communication'

被引:0
|
作者
Khan, Muhammad Khurram [1 ]
Zhang, Jiashu [1 ]
机构
[1] SW Jiao Tong Univ, Sichuan Key Lab Signal & Informat PRocessing, Res Grp Biometr & Secur, Chengdu 610031, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, Lee et al. proposed 'an improved low computation cost user authentication scheme for mobile communication'. We demonstrate that their scheme is vulnerable and susceptible to the attacks and can be easily cryptanalyzed. We point out that their scheme performs unilateral'authentication (only client authentication) and there is no mutual authentication between user and remote system, so their scheme suscepts from the server spoofing attack. Furthermore, an adversary can impersonate legitimate users by copying data of their stolen or lost smart card. Moreover, Lee et al.'s scheme is poorly reparable, which makes their method infeasible to implement.
引用
收藏
页码:276 / 279
页数:4
相关论文
共 50 条
  • [41] Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Yoon, Eun-Jun
    Yoo, Kee-Young
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (06): : 1687 - 1689
  • [42] Security analysis of a nonce-based user authentication scheme using smart cards
    Nam, Junghyun
    Kim, Seungjoo
    Park, Sangjoon
    Won, Dongho
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (01) : 299 - 302
  • [43] Security analysis and enhancements of an improved multi-factor biometric authentication scheme
    Park, YoHan
    Park, KiSung
    Lee, KyungKeun
    Song, Hwangjun
    Park, YoungHo
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (08):
  • [44] Security analysis and improvement of the remote user authentication scheme without using smart cards
    Shieh, Wen-Gong
    Horng, Wen-Bing
    ICIC Express Letters, 2010, 4 (6 B): : 2431 - 2436
  • [45] Design and logical analysis on the access authentication scheme for satellite mobile communication networks
    Zheng, G.
    Ma, H. -T.
    Cheng, C.
    Tu, Y. -C.
    IET INFORMATION SECURITY, 2012, 6 (01) : 6 - 13
  • [46] Security Vulnerabilities of User Authentication Scheme Using Smart Card
    Pippal, Ravi Singh
    Jaidhar, C. D.
    Tapaswi, Shashikala
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 106 - 113
  • [47] Security of a remote user authentication scheme using smart cards
    Yeh, HT
    Sun, HM
    Hsieh, BT
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (01) : 192 - 194
  • [48] Security Problems of a "More Secure Remote User Authentication Scheme"
    Kumari, Saru
    Karuppiah, Marimuthu
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2016, : 520 - 521
  • [49] Security enhanced user authentication scheme for wireless sensor network
    Jannati, Hoda
    Falahati, Abolfazl
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 215 - 228
  • [50] Security enhancement of user authentication scheme for wireless sensor networks
    Lee, Yung-Cheng
    Hsieh, Yi-Chih
    You, Peng-Sheng
    Lee, Pei-Ju
    ICIC Express Letters, Part B: Applications, 2014, 5 (02): : 327 - 332