Multimedia and Ubiquitous Engineering pp 451-458 | Cite as
An Improvement of Encrypted Remote User Authentication Scheme by Using Smart Card
Conference paper
Abstract
Remote user authentication scheme is one of the most convenient authentication schemes to deal with secret data over insecure channels. In 2012, Yassin et al. proposed encrypted remote user authentication scheme by using smart card. They claimed that their scheme is secure against various attacks. In this paper, however, we display that their scheme is insecure and vulnerable to outsider attack, smart card stolen attack, offline password guessing attack, and masquerading attack. To overcome the drawback, we propose a new encrypted remote user authentication scheme by using smart card.
Keywords
smart card remote user authentication outsider attack offline password guessing attack masquerading attackPreview
Unable to display preview. Download preview PDF.
References
- 1.Lamport, L.: Password authentication with insecure communication. Communications of the ACM, 770–772 (1981)Google Scholar
- 2.Chein, H.-Y., Chen, C.H.: A remote authentication scheme preserving user anonymity. Advanced Information Networking and Application 2, 245–248 (2005)Google Scholar
- 3.Lee, Y., Nam, J., Won, D.: Security enhancement of a remote user authentication scheme using smart cards. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 508–516. Springer, Heidelberg (2006)CrossRefGoogle Scholar
- 4.Nam, J., Kim, S., Park, S., Won, D.: Security analysis of a nonce-based user authentication scheme using smart cards. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 90(1), 299–302 (2007)CrossRefGoogle Scholar
- 5.Yi, W., Kim, S., Won, D.: Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments. In: Gervasi, O., Taniar, D., Murgante, B., Laganà, A., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2009, Part II. LNCS, vol. 5593, pp. 182–190. Springer, Heidelberg (2009)CrossRefGoogle Scholar
- 6.Jin, Q., Lee, K., Won, D.: Cryptanalysis of a two-factor user authentication scheme over insecure channels. In: ISA 2012 (2012)Google Scholar
- 7.He, D., Wu, S.: Security flaws in smart card based authentication scheme for multi server environment. Wireless Personal Communications, 0929–6212 (2012)Google Scholar
- 8.Son, K., Han, D., Won, D.: A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards. IEICE Transactions on Communications 95(5), 1819–1821 (2012)CrossRefGoogle Scholar
- 9.Das, M.L., Saxena, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics 50(2), 629–631 (2004)CrossRefGoogle Scholar
- 10.Wang, Y.Y., Liu, J.Y., Xiao, F.X., Dan, J.: A more efficient and secure dynamic ID-based remote user authentication scheme. Computer Communications 4(32), 583–585 (2009)CrossRefGoogle Scholar
- 11.Yassin, A.A., Jin, H., Ibrahim, A., Zou, D.: Encrypted Remote User Authentication Scheme by Using Smart Card. In: Wang, F.L., Lei, J., Gong, Z., Luo, X. (eds.) WISM 2012. LNCS, vol. 7529, pp. 314–323. Springer, Heidelberg (2012)CrossRefGoogle Scholar
- 12.Mun, J., Kim, J., Jeon, W., Lee, Y., Won, D.: Cryptanalysis of Encrypted Remote User Authentication Scheme by Using Smart Card. In: Jeong, H.Y., Yen, N.Y., Park, J.J(J.H.) (eds.) Advanced in Computer Science and Its Applications. LNEE, vol. 279, pp. 423–428. Springer, Heidelberg (2014)CrossRefGoogle Scholar
Copyright information
© Springer-Verlag Berlin Heidelberg 2014