An Improvement of Encrypted Remote User Authentication Scheme by Using Smart Card

  • Jongho Mun
  • Jiye Kim
  • Woongryul Jeon
  • Youngsook Lee
  • Dongho Won
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 308)

Abstract

Remote user authentication scheme is one of the most convenient authentication schemes to deal with secret data over insecure channels. In 2012, Yassin et al. proposed encrypted remote user authentication scheme by using smart card. They claimed that their scheme is secure against various attacks. In this paper, however, we display that their scheme is insecure and vulnerable to outsider attack, smart card stolen attack, offline password guessing attack, and masquerading attack. To overcome the drawback, we propose a new encrypted remote user authentication scheme by using smart card.

Keywords

smart card remote user authentication outsider attack offline password guessing attack masquerading attack 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Lamport, L.: Password authentication with insecure communication. Communications of the ACM, 770–772 (1981)Google Scholar
  2. 2.
    Chein, H.-Y., Chen, C.H.: A remote authentication scheme preserving user anonymity. Advanced Information Networking and Application 2, 245–248 (2005)Google Scholar
  3. 3.
    Lee, Y., Nam, J., Won, D.: Security enhancement of a remote user authentication scheme using smart cards. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 508–516. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  4. 4.
    Nam, J., Kim, S., Park, S., Won, D.: Security analysis of a nonce-based user authentication scheme using smart cards. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 90(1), 299–302 (2007)CrossRefGoogle Scholar
  5. 5.
    Yi, W., Kim, S., Won, D.: Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments. In: Gervasi, O., Taniar, D., Murgante, B., Laganà, A., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2009, Part II. LNCS, vol. 5593, pp. 182–190. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  6. 6.
    Jin, Q., Lee, K., Won, D.: Cryptanalysis of a two-factor user authentication scheme over insecure channels. In: ISA 2012 (2012)Google Scholar
  7. 7.
    He, D., Wu, S.: Security flaws in smart card based authentication scheme for multi server environment. Wireless Personal Communications, 0929–6212 (2012)Google Scholar
  8. 8.
    Son, K., Han, D., Won, D.: A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards. IEICE Transactions on Communications 95(5), 1819–1821 (2012)CrossRefGoogle Scholar
  9. 9.
    Das, M.L., Saxena, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics 50(2), 629–631 (2004)CrossRefGoogle Scholar
  10. 10.
    Wang, Y.Y., Liu, J.Y., Xiao, F.X., Dan, J.: A more efficient and secure dynamic ID-based remote user authentication scheme. Computer Communications 4(32), 583–585 (2009)CrossRefGoogle Scholar
  11. 11.
    Yassin, A.A., Jin, H., Ibrahim, A., Zou, D.: Encrypted Remote User Authentication Scheme by Using Smart Card. In: Wang, F.L., Lei, J., Gong, Z., Luo, X. (eds.) WISM 2012. LNCS, vol. 7529, pp. 314–323. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  12. 12.
    Mun, J., Kim, J., Jeon, W., Lee, Y., Won, D.: Cryptanalysis of Encrypted Remote User Authentication Scheme by Using Smart Card. In: Jeong, H.Y., Yen, N.Y., Park, J.J(J.H.) (eds.) Advanced in Computer Science and Its Applications. LNEE, vol. 279, pp. 423–428. Springer, Heidelberg (2014)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Jongho Mun
    • 1
  • Jiye Kim
    • 1
  • Woongryul Jeon
    • 1
  • Youngsook Lee
    • 2
  • Dongho Won
    • 1
  1. 1.School of Information and Communication EngineeringSungkyunkwan UniversitySeoulKorea
  2. 2.Department of Cyber Investigation PoliceHowon UniversityGunsanKorea

Personalised recommendations