Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'

被引:73
|
作者
Kumari, Saru [1 ]
Khan, Muhammad Khurram [2 ]
机构
[1] Dr BR Ambedkar Univ, Agra Coll, Dept Math, Agra 282002, Uttar Pradesh, India
[2] King Saud Univ, Riyadh 11653, Saudi Arabia
关键词
two-factor security; smart card; session-key disclosure; password-guessing attack; user anonymity; user impersonation attack; EFFICIENT;
D O I
10.1002/dac.2590
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the use of smart card in user authentication mechanisms, the concept of two-factor authentication came into existence. This was a forward move towards more secure and reliable user authentication systems. It elevated the security level by requiring a user to possess something in addition to know something. In 2010, Sood et al. and Song independently examined a smart-card-based authentication scheme proposed by Xu et al. They showed that in the scheme of Xu et al., an internal user of the system can turn hostile to impersonate other users of the system. Both of them also proposed schemes to improve the scheme of Xu et al. Recently, Chen et al. identified some security problems in the improved schemes proposed by Sood et al. and Song. To fix these problems, Chen et al. presented another scheme, which they claimed to provide mutual authentication and withstand lost smart card attack. Undoubtedly, in their scheme, a user can also verify the legitimacy of server, but we find that the scheme fails to resist impersonation attacks and privileged insider attack. We also show that the scheme does not provide important features such as user anonymity, confidentiality to air messages, and revocation of lost/stolen smart card. Besides, the scheme defies the very purpose of two-factor security. Furthermore, an attacker can guess a user's password from his or her lost/stolen smart card. To meet these challenges, we propose a user authentication method with user anonymity. We show through analysis and comparison that the proposed scheme exhibits enhanced efficiency in contrast to related schemes, including the scheme of Chen et al. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:3939 / 3955
页数:17
相关论文
共 50 条
  • [1] Cryptanalysis of 'A Robust Smart-Card-Based Remote User Password Authentication Scheme'A
    Kumari, Saru
    Bin Muhaya, Fahad
    Khan, Muhammad Khurram
    Kumar, Rahul
    [J]. 2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 247 - 250
  • [2] Robust smart-card-based remote user password authentication scheme
    Chen, Bae-Ling
    Kuo, Wen-Chung
    Wuu, Lih-Chyau
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (02) : 377 - 389
  • [3] Improvement of robust smart-card-based password authentication scheme
    Jiang, Qi
    Ma, Jianfeng
    Li, Guangsong
    Li, Xinghua
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (02) : 383 - 393
  • [4] Cryptanalysis and Improvement of Remote User Authentication Scheme Using Smart Card
    Madhusudhan, R.
    Hegde, Manjunath
    [J]. PROCEEDINGS OF 6TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE 2016), 2016, : 84 - 89
  • [5] A smart-card-based remote authentication scheme
    Chang, CC
    Lee, JS
    [J]. ICESS 2005: SECOND INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2005, : 445 - 449
  • [6] Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card
    Amin, Ruhul
    Maitra, Tanmoy
    Giri, Debasis
    Srivastava, P. D.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (03) : 4629 - 4659
  • [7] Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card
    Ruhul Amin
    Tanmoy Maitra
    Debasis Giri
    P. D. Srivastava
    [J]. Wireless Personal Communications, 2017, 96 : 4629 - 4659
  • [8] Offline Password Guessing Attacks on Smart-Card-Based Remote User Authentication Schemes
    Li, Xue-lei
    Wen, Qiao-yan
    Zhang, Hua
    Jin, Zheng-ping
    Li, Wen-min
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL ASIA CONFERENCE ON INDUSTRIAL ENGINEERING AND MANAGEMENT INNOVATION, VOL 2: INNOVATION AND PRACTICE OF INDUSTRIAL ENGINEERING AND MANAGMENT, 2016, : 81 - 89
  • [9] Cryptanalysis of a Sensor Smart Card Based Password Authentication Scheme with User Anonymity
    Cao, Tianjie
    Huang, Shi
    [J]. SENSOR LETTERS, 2013, 11 (11) : 2149 - 2151
  • [10] Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards
    He, Debiao
    Wang, Ding
    Wu, Shuhua
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (02): : 170 - 177