Weakness of remote authentication scheme of Chen et al.

被引:5
|
作者
Tang, Hong-bin [1 ]
Liu, Xin-song [2 ]
Chen, Jian-ying [3 ]
机构
[1] CEPREI Certificat Body, Guangzhou 510610, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[3] Southwest Univ Nationalities, Coll Comp Sci Technol, Chengdu 610041, Peoples R China
关键词
mobile device; fingerprint; password; authentication; protocol; cryptography;
D O I
10.1002/dac.2534
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The extensive application of mobile commerce has led researchers to design more secure protocols for mobile devices during the recent years. In 2011, Chen et al. proposed a three-factor mobile device-based remote authentication scheme, which tackled the security risk imposed by the loss of both password and mobile device. Scheme of Chen et al., however, is still vulnerable to the privileged insider attack, the replay attack, the impersonation attack, and the denial of service attack. It is not feasible for real-life implementation. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:3199 / 3203
页数:5
相关论文
共 50 条
  • [1] The Weakness of Moon et al.'s Password Authentication Scheme
    Irawan, Bam-bang
    Hwang, Min-shiang
    [J]. 3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [2] Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card
    Kumari, Saru
    Gupta, Mridul K.
    Kumar, Manoj
    [J]. OPEN COMPUTER SCIENCE, 2012, 2 (01): : 60 - 75
  • [3] Security Issues of Chen et al.'s Dynamic ID-based Authentication Scheme
    Khan, Muhammad Khurram
    Kumari, Saru
    Wang, Xiaomin
    Kumar, Rahul
    [J]. 2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 125 - +
  • [4] Cryptanalysis and improvement of barman et al.’s secure remote user authentication scheme
    Patel, Chintan
    Doshi, Nishant
    [J]. International Journal of Circuits, Systems and Signal Processing, 2019, 13 : 604 - 610
  • [5] Improvement of Chien et al.'s remote user authentication scheme using smart cards
    Lee, SW
    Kim, HS
    Yoo, KY
    [J]. COMPUTER STANDARDS & INTERFACES, 2005, 27 (02) : 181 - 183
  • [6] Cryptanalysis of Wang et al.'s remote user authentication scheme using smart cards
    Yoon, Eun-Jun
    Lee, Eun-Jung
    Yoo, Kee-Young
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 575 - +
  • [7] Security of Chien et al.'s remote user authentication scheme using smart cards
    Hsu, CL
    [J]. COMPUTER STANDARDS & INTERFACES, 2004, 26 (03) : 167 - 169
  • [8] Response to Chen et al.
    Ye, Liangtao
    Reiter, Florian P.
    Guba, Markus
    De Toni, Enrico N.
    [J]. CLINICAL AND TRANSLATIONAL GASTROENTEROLOGY, 2020, 11
  • [9] Reply to Chen et al.
    Fila, Petr
    Gofus, Jan
    Nemec, Petr
    Vojacek, Jan
    [J]. EUROPEAN JOURNAL OF CARDIO-THORACIC SURGERY, 2022, 62 (04)
  • [10] Chen et al. reply
    Chen W.
    OuYang B.
    Chou J.J.
    [J]. Nature, 2018, 562 (7727) : E19 - E20