Abstract
Password-based authentication schemes have been widely adopted to protect resources from unauthorized access. In 2008, Chang-Lee proposed a friendly password mutual authentication scheme to avoid the security weaknesses of Wu-Chieu’s scheme. In this paper, we have shown that Chang-Lee’s scheme is vulnerable to the forgery attack and password guessing attack, etc. Also, we proposed the improved scheme to overcome these security weaknesses, even if the secret information stored in the smart card is revealed. As a result of security analysis, the proposed scheme is secure against the forgery attack and password guessing attack, etc. And the performance of the proposed scheme is more efficient than that of Chang-Lee’s scheme in terms of the computational complexities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM 24(11), 770–772 (1981)
Hwang, M.S., Li, L.H.: A New Remote User Authentication Scheme Using Smart Cards. IEEE Transactions on Consumer Electronics 46, 28–30 (2000)
Sun, H.M.: An Efficient Remote User Authentication Scheme Using Smart Cards. IEEE Transactions on Consumer Electronics 46(4), 958–961 (2000)
Wu, S.T., Chieu, B.C.: A User Friendly Remote Authentication Scheme with Smart Cards. Computers & Security 22(6), 457–550 (2003)
Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Further Improvements of an Efficient Password based Remote User Authentication Scheme Using Smart Cards. IEEE Transactions on Consumer Electronics 50(2), 612–614 (2004)
Yang, C.C., Wang, R.C.: Cryptanalysis of a User Friendly Remote Authentication Scheme with Smart Cards. Computers & Security 223(5), 425–427 (2004)
Chang, C.C., Lee, C.Y.: A Friendly Password Mutual Authentication Scheme for Remote Login Network Systems. International Journal of Multimedia and Ubiquitous Engineering 3(1), 59–63 (2008)
Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Transactions on Computers 51(5), 541–552 (2002)
Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
An, Y. (2011). Improved Password Mutual Authentication Scheme for Remote Login Network Systems. In: Kim, Th., et al. Multimedia, Computer Graphics and Broadcasting. MulGraB 2011. Communications in Computer and Information Science, vol 263. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27186-1_34
Download citation
DOI: https://doi.org/10.1007/978-3-642-27186-1_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27185-4
Online ISBN: 978-3-642-27186-1
eBook Packages: Computer ScienceComputer Science (R0)