Understanding Security Failures of Two Authentication and Key Agreement Schemes for Telecare Medicine Information Systems

被引:0
|
作者
Dheerendra Mishra
机构
[1] Indian Institute of Technology,Department of Mathematics
来源
关键词
Telecare medicine information system; Authentication; Key agreement; Chaotic maps; Elliptic curve cryptography; Cryptanalysis;
D O I
暂无
中图分类号
学科分类号
摘要
Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee’s scheme and Xu et al.’s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee’s scheme and Xu et al.’s scheme in this paper.
引用
下载
收藏
相关论文
共 50 条
  • [41] A Secure Authentication Scheme for Telecare Medicine Information Systems
    Wu, Zhen-Yu
    Lee, Yueh-Chun
    Lai, Feipei
    Lee, Hung-Chang
    Chung, Yufang
    JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (03) : 1529 - 1535
  • [42] A Secure Authentication Scheme for Telecare Medicine Information Systems
    Zhen-Yu Wu
    Yueh-Chun Lee
    Feipei Lai
    Hung-Chang Lee
    Yufang Chung
    Journal of Medical Systems, 2012, 36 : 1529 - 1535
  • [43] Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol
    Arshad, Hamed
    Nikooghadam, Morteza
    JOURNAL OF SUPERCOMPUTING, 2015, 71 (08): : 3163 - 3180
  • [44] Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol
    Hamed Arshad
    Morteza Nikooghadam
    The Journal of Supercomputing, 2015, 71 : 3163 - 3180
  • [45] Understanding security failures of anonymous authentication schemes for cloud environments
    Xu, Meijia
    Wang, Ding
    Wang, Qingxuan
    Jia, Qiaowen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 118
  • [46] A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems
    Li, Chun-Ta
    Lee, Cheng-Chi
    Weng, Chi-Yao
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (09)
  • [47] A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems
    Chun-Ta Li
    Cheng-Chi Lee
    Chi-Yao Weng
    Journal of Medical Systems, 2014, 38
  • [48] Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Wei-Chuen Yau
    Raphael C.-W. Phan
    Journal of Medical Systems, 2013, 37
  • [49] Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems
    Sutrala, Anil Kumar
    Das, Ashok Kumar
    Odelu, Vanga
    Wazid, Mohammad
    Kumari, Saru
    COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2016, 135 : 167 - 185
  • [50] Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    Yau, Wei-Chuen
    Phan, Raphael C. -W.
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (06)