Understanding Security Failures of Two Authentication and Key Agreement Schemes for Telecare Medicine Information Systems

被引:0
|
作者
Dheerendra Mishra
机构
[1] Indian Institute of Technology,Department of Mathematics
来源
关键词
Telecare medicine information system; Authentication; Key agreement; Chaotic maps; Elliptic curve cryptography; Cryptanalysis;
D O I
暂无
中图分类号
学科分类号
摘要
Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee’s scheme and Xu et al.’s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee’s scheme and Xu et al.’s scheme in this paper.
引用
下载
收藏
相关论文
共 50 条
  • [11] On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems
    Kim, Kee-Won
    Lee, Jae-Dong
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (05)
  • [12] A Lightweight Authentication and Key Agreement Scheme for Telecare Medicine Information System
    Lo, Jung-Wen
    Wu, Chun-Yueh
    Chiou, Shu-Fen
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (01): : 263 - 272
  • [13] A Secure Authentication and Key Agreement Protocol for Telecare Medicine Information System
    Li, Xuanang
    Zheng, Zhiming
    Zhang, Xiao
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 275 - 281
  • [14] A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems
    Masdari, Mohammad
    Ahmadzadeh, Safiyyeh
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 87 : 1 - 19
  • [15] A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems
    Xin Xu
    Ping Zhu
    Qiaoyan Wen
    Zhengping Jin
    Hua Zhang
    Lian He
    Journal of Medical Systems, 2014, 38
  • [16] Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Hamed Arshad
    Morteza Nikooghadam
    Journal of Medical Systems, 2014, 38
  • [17] A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems
    Xu, Xin
    Zhu, Ping
    Wen, Qiaoyan
    Jin, Zhengping
    Zhang, Hua
    He, Lian
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (01)
  • [18] Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Arshad, Hamed
    Nikooghadam, Morteza
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (12)
  • [19] A Secure Smart-Card Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Lee, Tian-Fu
    Liu, Chuan-Ming
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (03)
  • [20] Cryptanalysis of a Chaotic Map-Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
    Roy, Sandip
    Chatterjee, Santanu
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 527 - 537