Understanding Security Failures of Two Authentication and Key Agreement Schemes for Telecare Medicine Information Systems

被引:0
|
作者
Dheerendra Mishra
机构
[1] Indian Institute of Technology,Department of Mathematics
来源
关键词
Telecare medicine information system; Authentication; Key agreement; Chaotic maps; Elliptic curve cryptography; Cryptanalysis;
D O I
暂无
中图分类号
学科分类号
摘要
Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee’s scheme and Xu et al.’s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee’s scheme and Xu et al.’s scheme in this paper.
引用
下载
收藏
相关论文
共 50 条
  • [1] Understanding Security Failures of Two Authentication and Key Agreement Schemes for Telecare Medicine Information Systems
    Mishra, Dheerendra
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (03)
  • [2] On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Hamed Arshad
    Vahid Teymoori
    Morteza Nikooghadam
    Hassan Abbassi
    Journal of Medical Systems, 2015, 39
  • [3] On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Arshad, Hamed
    Teymoori, Vahid
    Nikooghadam, Morteza
    Abbassi, Hassan
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (08)
  • [4] A Robust and Anonymous Two Factor Authentication and Key Agreement Protocol for Telecare Medicine Information Systems
    Xiong, Hu
    Tao, Junyi
    Chen, Yanan
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
  • [5] A Robust and Anonymous Two Factor Authentication and Key Agreement Protocol for Telecare Medicine Information Systems
    Hu Xiong
    Junyi Tao
    Yanan Chen
    Journal of Medical Systems, 2016, 40
  • [6] Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems
    Islam, S. K. Hafizul
    Khan, Muhammad Khurram
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (10)
  • [7] Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems
    SK Hafizul Islam
    Muhammad Khurram Khan
    Journal of Medical Systems, 2014, 38
  • [8] A Survey of Authentication Schemes in Telecare Medicine Information Systems
    Muhammad Umair Aslam
    Abdelouahid Derhab
    Kashif Saleem
    Haider Abbas
    Mehmet Orgun
    Waseem Iqbal
    Baber Aslam
    Journal of Medical Systems, 2017, 41
  • [9] A Survey of Authentication Schemes in Telecare Medicine Information Systems
    Aslam, Muhammad Umair
    Derhab, Abdelouahid
    Saleem, Kashif
    Abbas, Haider
    Orgun, Mehmet
    Iqbal, Waseem
    Aslam, Baber
    JOURNAL OF MEDICAL SYSTEMS, 2017, 41 (01)
  • [10] On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems
    Kee-Won Kim
    Jae-Dong Lee
    Journal of Medical Systems, 2014, 38