Understanding security failures of multi-factor authentication schemes for multi-server environments

被引:46
|
作者
Wang, Ding [1 ,2 ,3 ]
Zhang, Xizhe [1 ]
Zhang, Zijian [4 ]
Wang, Ping [3 ,4 ,5 ,6 ]
机构
[1] Peking Univ, Sch EECS, Beijing 100871, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] PKU, Minist Educ, Key Lab High Condence Software Technol, Beijing, Peoples R China
[4] Peking Univ, Sch ECE, Shenzhen Grad Sch, Shenzhen 518055, Guangdong, Peoples R China
[5] Peking Univ, Sch Software & Microelect, Beijing 100260, Peoples R China
[6] Natl Engn Res Ctr Software Engn, Beijing 100871, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Multi-factor authentication; Password; User anonymity; Smart card loss attack; Multi-factor security; Forward secrecy; REMOTE PASSWORD AUTHENTICATION; KEY AGREEMENT SCHEME; WIRELESS SENSOR NETWORKS; USER AUTHENTICATION; SMART-CARD; 3-FACTOR AUTHENTICATION; MUTUAL AUTHENTICATION; POWER ANALYSIS; EFFICIENT; PROTOCOL;
D O I
10.1016/j.cose.2019.101619
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Revealing the security flaws of existing cryptographic protocols is the key to understanding how to achieve better security. Dozens of multi-factor authentication schemes for multi-server environments were successively proposed, yet most of them have been shortly found problematic. The research pattern of this area has fallen into the undesirable "break-fix-break-fix" cycle, in which lots of efforts have been devoted but little real progress has been made. In this paper, we revisit five leading two-factor authentication schemes for multi-server environments (i.e., Xu et al. scheme at ICICS'17, Wu et al. scheme at FC'17, Leu-Hsieh's scheme at IET IS'14, Zhou et al. scheme at WINET'18 and Roy et al. scheme at IEEE TII'19), and demonstrate that all of them suffer from critical security defects (e.g., no truly multi-factor security and temporary information leakage attack) or are short of important properties (e.g., no user anonymity). Our results invalidate any use of these five schemes for practical applications without further improvement, and underscore some new challenges (e.g., attacks arising from the leakage of session-specific parameters and from malicious insiders) in designing sound multi-factor schemes for multi-server environments. We also draw some useful lessons from the cryptanalysis results. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] A taxonomy of user authentication schemes for multi-server environments
    Yang, Hung-Wei
    Pan, Hsieh-Tsen
    Chen, Yung-Hsing
    Hwang, Min-Shiang
    [J]. International Journal of Network Security, 2020, 22 (03): : 365 - 372
  • [2] Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices
    Wang, Qingxuan
    Wang, Ding
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 597 - 612
  • [3] A Novel Three-Factor Authentication Scheme with High Security for Multi-Server Environments
    Rui Chen
    Yongcong Mou
    Min Zhang
    [J]. Wireless Personal Communications, 2022, 124 : 763 - 781
  • [4] A Novel Three-Factor Authentication Scheme with High Security for Multi-Server Environments
    Chen, Rui
    Mou, Yongcong
    Zhang, Min
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (01) : 763 - 781
  • [5] On the security of an authentication scheme for multi-server architecture
    [J]. He, D. (hedebiao@163.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (05): : 3 - 4
  • [6] On the security of an authentication scheme for multi-server architecture
    He, Debiao
    Chen, Jianhua
    Shi, Wenbo
    Khan, Muhammad Khurram
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2013, 5 (3-4) : 288 - 296
  • [7] A two-factor authentication scheme with anonymity for multi-server environments
    Chen, Chi-Tung
    Lee, Cheng-Chi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1608 - 1625
  • [8] A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture
    Shukla, Shivangi
    Patel, Sankita J.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (02): : 1559 - 1580
  • [9] A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture
    Shivangi Shukla
    Sankita J. Patel
    [J]. Cluster Computing, 2024, 27 : 1559 - 1580
  • [10] Crytanalysis of Three Anonymous Authentication Schemes for Multi-Server Environment
    对三个多服务器环境下匿名认证协议的分析
    [J]. Wang, Ping (pwang@pku.edu.cn), 1937, Chinese Academy of Sciences (29):