Cryptanalysis of Anonymous Three Factor-Based Authentication Schemes for Multi-server Environment

被引:1
|
作者
Mo, Jiaqing [1 ]
Chen, Hang [1 ]
Shen, Wei [1 ]
机构
[1] Zhaoqing Univ, Sch Comp Sci & Software, Zhaoqing 526061, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Three-factor security; Offline password guessing attack; Multi-server environment; PROTOCOL; SECURITY; IMPROVEMENT; EFFICIENT; DESIGN;
D O I
10.1007/978-3-030-16946-6_36
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cryptanalyzing the security weaknesses of authentication protocols is extremely important to propose countermeasures and develop a truly secure protocol. Over last few years, many three factor-based authentication schemes with key agreement have been proposed for multi-server environment. In 2017, Ali and Pal developed a three-factor authentication scheme in multi-server environment using elliptic curve cryptography (ECC) to remedy the security flaws in Li et al.'s scheme and claimed their improved version can withstand the passive and active attacks. In this paper, we prove that Ali-Pal's scheme is subject to offline password guessing attack, replay attack, and known session-specific temporary information (KSSTI) attack. In the same year, Feng et al. examined Kumari et al.'s biometrics-based authentication scheme for multi-server environment and found that their scheme was vulnerable to several attacks. To fix these weaknesses, Feng et al. proposed an enhanced three-factor authentication scheme with key distribution for mobile multi-server environment and claimed that their scheme can satisfy the security and functional requirements. However, we show that Feng et al.'s scheme fails to resist offline password guessing attack, and suffers from replay attack. In addition to point out the security defects, we put forward countermeasures to eliminate the security risks and secure the three factor-based authentication schemes for multi-server environment.
引用
收藏
页码:456 / 468
页数:13
相关论文
共 50 条
  • [1] A secure three factor-based fully anonymous user authentication protocol for multi-server environment
    Mahor, Vinod Kumar
    Padmavathi, R.
    Chatterjee, Santanu
    Dewangan, Sanshray Kumar
    Kumar, Manish
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2020, 34 (01) : 45 - 60
  • [2] Crytanalysis of Three Anonymous Authentication Schemes for Multi-Server Environment
    对三个多服务器环境下匿名认证协议的分析
    [J]. Wang, Ping (pwang@pku.edu.cn), 1937, Chinese Academy of Sciences (29):
  • [3] Cryptanalysis and Extended Three-Factor Remote User Authentication Scheme in Multi-Server Environment
    Chandrakar, Preeti
    Om, Hari
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2017, 42 (02) : 765 - 786
  • [4] Cryptanalysis and Extended Three-Factor Remote User Authentication Scheme in Multi-Server Environment
    Preeti Chandrakar
    Hari Om
    [J]. Arabian Journal for Science and Engineering, 2017, 42 : 765 - 786
  • [5] Cryptanalysis of Two Dynamic Identity Based Authentication Schemes for Multi-Server Architecture
    Wan Tao
    Jiang Nan
    Ma Jianfeng
    [J]. CHINA COMMUNICATIONS, 2014, 11 (11) : 125 - 134
  • [6] Cryptanalysis and Improvement User Authentication Scheme for Multi-server Environment
    Kang, Dongwoo
    Moon, Jongho
    Lee, Donghoon
    Won, Dongho
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2016, PT V, 2016, 9790 : 87 - 99
  • [7] Cryptanalysis of Provably Secure Authentication Scheme for Multi-Server Environment
    Sudhakar, T.
    Natarajan, V.
    [J]. 2018 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2018, : 43 - 46
  • [8] Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines
    Chuang, Yun-Hsin
    Lei, Chin-Laung
    Shiu, Hung-, Jr.
    [J]. 2020 15TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2020), 2020, : 66 - 73
  • [9] Anonymous and Authentication Protocol for Multi-Server
    Kuo, Wen-Chung
    Shih, Po-Wei
    Huang, Yu-Chih
    Wuu, Lih-Chyau
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2017, 46 (02): : 235 - 245
  • [10] Cryptanalysis of Anonymous Authenticated and Key Agreement Scheme Based on Biometric for Multi-Server Environment
    Kuo, Wen-Chung
    Wei, Hong-Ji
    Chen, Yu-Hui
    Cheng, Jiin-Chiou
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 782 - 787