Volume 31 Issue 10
Oct.  2005
Turn off MathJax
Article Contents
Zhang Lihua, Lü Shanwei. Analysis and improvements of a remote authentication scheme[J]. Journal of Beijing University of Aeronautics and Astronautics, 2005, 31(10): 1076-1079. (in Chinese)
Citation: Zhang Lihua, Lü Shanwei. Analysis and improvements of a remote authentication scheme[J]. Journal of Beijing University of Aeronautics and Astronautics, 2005, 31(10): 1076-1079. (in Chinese)

Analysis and improvements of a remote authentication scheme

  • Received Date: 09 Jun 2004
  • Publish Date: 31 Oct 2005
  • Password authentication scheme is a very promising and practical solution to remote user authentication.The security of a proposed password authentication scheme using smart cards is analyzed. The scheme has some weaknesses: it cannot resist parallel session attack, an intruder without knowing users' password can masquerade as a legal user by creating a valid login message from the eavesdropped communication, then passes the authentication phase and gains the authority of the legitimate user; it is also vulnerable to changing timestamps attack, an intruder can masquerade as a legal user or impersonate a valid authentication system by changing timestamps of the messages from eavesdropped communication. Furthermore, an enhanced password authentication scheme using smart cards with better security strength by using login counter and different keys via cards is proposed. The scheme has many merits as following: it lets users freely choose and change their passwords at their own will; it provides mutual authentication between two entities; it resists message replaying attack and insider attack; it has strong security reparability by using extended identities and smart cards; it also withstands parallel session attack and changing timestamps attack.

     

  • loading
  • [1] Lamport L. Password suthentication with insecure communication. Communications of the ACM, 1981, 24(11):770~772 [2] Hwang M S, Li L H. A new remote authentication scheme using smart cards[J] IEEE Transactions on Consumer Electronics, 2000,46(1):28~30 [3] Chan C K, Cheng L M. Cryptanalysis of a remote user authentication scheme using smart cards[J] IEEE Transactions on Consumer Electronics, 2000,46(4):992~993 [4] Shen J J, Lin C W, Hwang M S. A modified remote user authentication scheme using smart cards[J] IEEE Transactions on Consumer Electronics, 2003, 49(2):414~416 [5] Leung K C, Cheng L M, Anthony S Fong, et al. Cryptanalysis of a modified remote user authentication scheme using smart cards [J] IEEE Transactions on Consumer Electronics, 2003, 39(14):1243~1245 [6] Amit K, Awasthi, Sunder L. A remote user authentication scheme using smart cards with forward secrecy[J] IEEE Transactions on Consumer Electronics, 2003, 49(4):1246~1248 [7] Sun H M. An efficient remote use authentication scheme using smart cards[J] IEEE Transactions on Consumer Electronics, 2000, 46(4):958~961 [8] Chien H Y, Jan J K, Tsing Y M. An efficient and practical solution to remote authentication:smart cards[J] Computers and Security, 2002, 21( 4):372~375 [9] Hsu C L. Security of two remote user authentication schemes using smart cards[J] IEEE Transactions on Consumer Electronics, 2003, 49(4):1196~1198. [10] Ku W C, Chen S M. Weaknesses and improvements of an efficient password base remote user authentication scheme using smart cards[J] IEEE Transactions on Consumer Electronics, 2004,50(1):204~206. [11] 李 莉,张焕国. 一种对密码协议攻击的分类分析[J] 计算机工程与应用, 2004,40(1):16~19 Li Li, Zhang Huanguo. Analyzing the attacks types on cryptographic protocol[J] Computer Engineering and Application, 2004,40(1):16~19(in Chinese) [12] Li Gong. A security risk of depending on synchronized clocks[J] Operating Systems Review, 1992, 26(1):49~53
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(2804) PDF downloads(884) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return