A Noble Remote User Authentication Protocol Based on Smart Card Using Hash Function

Size: px
Start display at page:

Download "A Noble Remote User Authentication Protocol Based on Smart Card Using Hash Function"

Transcription

1 A Noble Remote User Authentication Protocol Based on Smart Card Using Hash Function Deepchand Ahirwal 1, Prof. Sandeep Raghuwanshi 2 1 Scholar M.Tech, Information Technology, Samrat Ashok Technological Institute, Vidisha (M. P.), India 2 Assistant Professor, Information Technology, Samrat Ashok Technological Institute, Vidisha (M. P.), India Abstract- The security issues are always raised for remote authentication service. Smart card based authentication protocol is best suited for authenticate legitimate user. Developing secure authentication protocol is a strong challenge. There are many potential attacks that are targeted at authentication such as insider attack, offline password guessing attack, masquerade attack, server spoofing attack, and parallel session attack. Recently many previous proposed schemes are fail to resist these attacks. In this paper we introduce a remote authentication protocol that provides secure mutual authentication process and session key agreement. Our proposed protocol is providing better security to resist all possible attacks. In this protocol, we use low computing cost hash function and random nonce. We use random nonce to avoid complexity of time synchronization. The proposed protocol is efficient and practical. It is easy to adapt in low-weight devices like the subscriber identity module. Keywords: - Authentication, Network security, cryptanalysis, smart card, hash function. 1. INTRODUCTION Smart card based remote user authentication is a mechanism to authenticate the legitimate user. Smart card based remote user authentication is mechanism to authenticate the legitimate user by using of smart. In Smart card s memory, some secret information has stored such as identification or password related information of user. In 1986, Lamport [12] introduced first remote user authentication with using of password verification table. In Lamport scheme s [12] user has unique identification and password for verifying as legitimate user. This password table takes lot of maintenance cost and unsecure to insider attack. And verification table has risks of being modified by the adversary and the size of the password verification table is directly proportional to the number of user and management of huge table increase load in the server. To avoid storing the password in the server verification table and sends in the plain text form in the insecure network system. In 2000, Hwang and Li [14] proposed a remote user authentication using smart card is based on ElGamal s public key scheme. This proposed protocol withstands replay attack by using time stamp T in login massage. In 2000, Chi and Cheng [2] cryptanalysis Hwang and Li [14] scheme, and found this scheme does not to resist impersonate attack. A legitimate user can impersonate other valid user to use his ID and PW without knowing the secret key. So this scheme was not suitable for secure remote authentication. In 2004, M.L.Das [15] proposed a dynamic ID-based remote user authentication protocol. This protocol use one-way hash function to protect the secret information and symmetric encryption function to encrypt the messages. But D. Giri [4] has analyzed that Das s [15] protocol is vulnerable the offline/ online password guessing attack and weak password change phase. Later, Rafael M. [17] point out the Das s protocol is not secure against insider attack, masquerade attack, server spoofing attack. In Das s [15] protocol, if the attack is legal user. He can extract h (x) secret key from Ai in smart card. Once he obtains secret key h (x), he tries to get other legitimate user s PW and also act as masquerade as legal user. While in 2005 H.Y. Chien and Chen et al. [9] point out that in das et al. s protocol user Ui sends the data (Cid, Ni, Ci, T) to the remote server. In each login request, although the Cid dynamically changes every time, the value Ni is same and unique to each user. So that das et al protocol failed to protect the user antonymic. H. Y. Chien and Chen et al. [9] Also proposed a mutual authentication protocol to preserve user anonymity based on modular exponentiation. This efficient is low. In 2007 L. I. Hu [11] found the Chien and Chen s [9] protocol is vulnerable to strong masquerade user or server attack, insider attack, replay attack and denial of service attacks and improved it to avoid these weakness. In 2009, J. Xu et al. [10] presented an authentication protocol using such non-tamper resistant smart card based on costly modular exponentiation. However R. Song [18] point out J. Xu et al. [10] s protocol is vulnerable to the user impersonation attack. In 2010, he introduced a new and more secure authentication protocol based on symmetric key cryptosystem and modular exponentiation. However W. B. Horng -Cheng [21] demonstrates that R. Song et al. Volume 1, Issue 4 November - December 2012 Page 62

2 [18] protocol is vulnerable to the offline password guessing, insider attack, denial-of service and proposed protocol does not provide perfect forward secrecy for session keys. In 2011, E.J Yoon and K.Y Yoo [5] demonstrated that Z. Jia s [25] remote authentication protocol is vulnerable to insider attack, forgery attack and server spoofing attack. They point out Jia s protocol does not provide mutual authentication between user and server. Moreover In 2011, Li and Cheng Lee [3] present a robust remote user authentication protocol using smart card. They claim that their proposed protocol is providing better authentication process and resistance to all possible attacks. But in this protocol is not provide security to the denial-of-service attack. In this article, we shall present a secure ID-based remote authentication protocol with mutual authentication and session key agreement. Moreover our protocol provides the user to choose and change their password by their own choice. In contrast, the propose protocol can resist parallel session attack, server spoofing attack, masquerade attack, insider attack, Further provides security analysis to compare with other published protocol. By performance analysis, the propose protocol is shown to be very efficient both in the storage and computation cost. The reminder of the article is organized as fallows. In section 2, we briefly discuss the Wang, Liu and Xiao s [20] protocol and its drawback. In Section 3 we Introduce our secure ID-based user authentication protocol, and we discuss the security analysis in session 4, compare the performance and efficiency of the propose protocol with other related protocol in session 5.and finally concludes the paper in Section REVIEW OF Y. WANG LIU AND XIAO S PROTOCOL Y. Wang, J. Liu and F. Xiao proposed a dynamic IDbased remote user authentication protocol in 2009 [20]. Wang et al. s authentication protocol is based on the security analysis of M. Das protocol. They point out that the authentication protocol proposed in M. Das s protocol [15] is vulnerable to masquerade attacks and lacks mutual authentication. Wang et al. s protocol can prevent these two vulnerabilities and is also very efficient [20]. Common notations Y.Wang, J. Liu, and F. Xiao denoted the user by U, the user s identity by ID, the user s password by PW, and server by S. Let h ( ) be a cryptographic one way hash function. Exclusive-or (XOR) operation on two binary strings is denoted by and the operation of binary string concatenation is denoted by. Finally, two types of channels are used. One of them is a common channel and other one is a secure channel. Wang s has used four phases in his protocol: registration phase, login Phase, verification phase and password change phase. The four phases of Wang et al. s protocol are described below. 1. Registration Phase In the registration phase, the user Ui chooses her own IDi and sends it to the remote server S. After S receives Ui s message, S performs the following Steps: Step1. S chooses a password PWi for Ui and computes Ni = h (PWi) h(x) IDi, in which x is the server s long term secret. Step2. S prepares a smart card for Ui by storing [h ( ), Ni, y] in it. y is the server s secret number which is stored in every user s smart card. Step3. S sends PWi and the smart card to Ui using the secure channel. S Ui: PWi and the smart card. 2. Login Phase: When Ui needs to access her data stored at the server, she invokes the login phase. Ui inserts her smart card into a card reader and enters her password PWi, and then the smart card performs the following steps: Step1. The smart card computes a dynamic IDi: CIDi = h (PWi) h (Ni y T) IDi, In which T is the current date and time. Step2. The smart card sends IDi, CIDi, Ni and T to the server. SCi S: IDi, CIDi, Ni, T. 3. Verification Phase When S receives the login message from Ui at time T, she parses it into the form {IDi, CIDi, Ni, T} and then performs the following steps: Step1. S checks whether T T ΔT. If it doesn t hold, then S directly rejects the user s login request. Step2. S computes h (PWi) = CIDi h (Ni y T) IDi. Step3. S computes IDi = Ni h(x) h (PWi) and checks whether IDi is equal to IDi. If IDi is not equal to IDi, then S rejects the user s login request; otherwise, S accepts the user s login request. Step4. S computes a = h (h (PWi) y T ) and sends (a, T ) to Ui. When Ui receives the message (a, T ) from S at time T, Ui verifies the identity of S, which contains the following step: 1. Ui checks whether T T ΔT. If it doesn t hold, then Ui recognizes the reply as invalid. Otherwise Ui, Volume 1, Issue 4 November - December 2012 Page 63

3 computes a = h (h (PWi) y T ) and compares it with a'. If a = a, Ui confirms that S is valid. 4. Password Change Phase: In Wang et al. s protocol, the user doesn t need to send her new password to the remote server during the password change phase. When the user wants to change his/her password from PWi to PWnew, he/she inserts the smart card into the card reader and enters both PWi and PWnew. Then the smart card computes Ni*= Ni h (PWi) h (PWnew) and replaces Ni with Ni*. 3. SECURITY ANALYSIS OF WANG ET AL. S PROTOCOL In this section we point out that Wang et al. s [20] protocol is vulnerable to password guessing attack and server masquerade attack. In addition, the password change phase in Wang et al. s protocol is not securing either [10]. 1. Password Guessing Attack The login phase and verification phase of Wang et al. s protocol use a common channel. So the adversary can eaves-drop the common channel and obtain messages from it. Once the adversary gets a lost smart card, he can obtain y from it. y is the server s secret which is stored in every user s smart card. Now the adversary tries to eavesdrop the common channel between Ui and S. By eavesdropping, the adversary can get the login message from Ui to S, which contains IDi, CIDi, Ni and T, in which CIDi = h (PWi) h (Ni y T) IDi. Then the password guessing attack is carried out with the following steps: (1) The adversary computes Xi = h (Ni y T) from Ni, y and T. (2) The adversary computes Yi = CIDi Xi IDi = h (PWi). (3) The adversary picks a random PW*, computes h (PW*) and compares h (PW*) with h (PWi). If they are equal, then due to the collision resistance of one way hash function, the adversary concludes that PW* is Ui s password. If they are not equal, then the adversary picks another password candidate and performs the same operations, until he finds the correct password. Because most passwords are chosen to be easy to remember, these have low entropy. This attack can be played efficiently. 2. Server Masquerade Attack In the attack described below, the adversary is just a normal user who is very curious of the server s secret h(x). This attack can be carried out by any single user without interactions with the server. As we cannot ensure all the users are honest, this type of attack must be prevented. The user carries out the attack by the following steps: (1) The user Ui gets the contents from the smart card by power analysis. So Ui gets y and Ni = h (PWi) h(x) IDi. (2) Since Ui already knows his own IDi and PWi, he computes Z = Ni h (PWi) IDi = h(x). Once Ui gets y and h(x), he gets the ability to perform the verification phase with other users by masquerading as the server, because the verification phase performs secret operations using only h(x) and y. Ui can even pretend to be the server during the registration phase, because he knows the value of h(x) and y. So we can see the server masquerade attack is easy to carry out. 3. The password change phase of Wang et al. s protocol is not secure. It allows an adversary who gets a lost smart card to change the value of Ni to another one, which causes denial of service to the legal user. This is also a security hole of Wang et al. s protocol. From the above analysis, we know that Wang et al. s protocol is vulnerable to these attacks. In the following section, we propose a security enhanced protocol, which does not suffer these attacks. 4. PROPOSED PROTOCOL In this section, we present a smart card based secure remote user authentication protocol. In proposed protocol we use one-way hash function, bitwise exclusive OR operation and random generate nonce. This protocol has four phases: 1- Registration phase, 2-Login phase, 3- authentication phase and 4- password change phase. The notations use in proposed protocol and phases are described below. The notations used throughout this article are summarized as follows: Volume 1, Issue 4 November - December 2012 Page 64 U i ID i PW i S X s h ( ) N i, N j Registration phase A remote user Identity of U i Password chosen by U i Authentication server Permanent secret key of S One way hash function Bitwise XOR operation Concatenation Random nonce generated by U i and S respectively In this phase User Ui wants to submit his/her identity IDi and password PWi to server Si via a secure channel to register himself/herself. Before send these information registration authority computes PWi to h (PWi) and send IDi and h (PWi) as a registration request to the server Si. Upon receiving the registration request from user Ui, the server Si computes two parameters Ai, Bi related to his request. Step1-Server computes Ai = h (X) Bi = Ai h (IDi h (PWi))

4 Login phase The server S issues a smart card to user U i by storing {A i, B i, h ( )} into smart card memory. The smart card is delivered to user U i through a secure channel. The user Ui wants access some service on remote server Si. This phase provides the facility of a secure login request to server Si. User Ui inserts smart card into a card reader and submits in IDi* and PWi*. Step 2- Firstly, the card reader computes Bi* = Ai h (IDi* h (PWi*)) And checks whether B i (stored in the smart card memory) and B i ' are equal or not. If yes, user U i is a legitimate bearer of the smart card. Step3- Then the card reader generates a nonce N i and computes. Z i = Ni Ai, C i = h (PW i *) h (A i N i ), D i = h (PW i *) A i, E i = h (D i N i B i ) And send the login request message {ID i, C i, E i, Z i } to the server S. Authentication phase Upon receiving the login request message {ID i, C i, E i, Z i }; server S first checks the validity of ID i to accept/reject the login request. If it is true, Step 1- Then the server S computes A i = h (X s ), N i = Z i A i, h (PW i ') = C i h (A i N i ), D i ' = h (PW i ') A i, B i ' = A i h (ID i ' h (PW i ')), E i ' = h (D i ' N i B i ') And checks whether E i and E i ' are equal or not. If they are not equal then rejects the login request. If true, Step 2- Then the server S generates a nonce N j and computes Z j = N j A i, F i = h (A i B i ' N i N j ) And send the message {F i, Z j } to the user U i. After receiving the message {F i, Z j } from server S, the card reader performs following computations. Step 3- The card reader computes N j = Z j A i, F i ' = h (A i B i ' N i N j ) And checks whether F i and F i ' are equal or not. If yes, server S is authentic otherwise terminate the session. Step 4- Then the user U i computes G i = h (A i N j B i ') And send the message {G i } to the server S. After receiving the message {G i } from user U i, server S computes G i ' = h (A i N j B i ') and checks whether G i and G i ' are equal or not. If yes, Step 5- The user U i is authentic and mutual authentication is achieved otherwise terminate the session. After mutual authentication, both the parties compute the session key SK = h (D i N i N j B i '). Figure 1 Data Flow Diagram for proposed protocol Password change phase This phase is invoked whenever user U i wants to change the password PW i with a new password PW inew. User U i inserts the smart card to the card reader and keys in ID i ' and PW i ' and requests to change password. Volume 1, Issue 4 November - December 2012 Page 65

5 Step 1- The card reader computes B i ' = A i h (ID i ' h (PW i ')) and checks whether B i and B i ' are equal or not. If yes, user U i is a legitimate bearer of the smart card otherwise reject the request. Step 2- Then the reader asks the user U i to input new password PW inew. After entering the new password, the reader calculates B inew = A i h (ID i ' h (PW inew )) and replaces B i with B inew in the smart card memory. SECURITY ANALYSIS OF PROPOSED PROTOCOL 1. Resistance to Stolen smart card Attack- In case a legitimate user losses his/her smart card. The adversary cannot use this card without knowing the valid password, and if adversary extracts information in its memory {Ai, Bi}. He cannot retrieve ID and PW, because it is computationally infeasible to invert the one-way hash function h (.) and without knowing the Server secret key X. It is not possible to guess out two parameters (ID and PW) correctly at the same time. Therefore the proposed protocol is secure against stolen smart card attack. 2. Resistance to Denial-of- service- In the proposed protocol, an adversary can used to invalid ID and PW, and wants to send login request massage continuously to keep server busy. It leads to denial-of-service attack. But he cannot send login request massage because in login phase, smart card reader checks the verification of smart card and correct password. Bi* = Ai h (IDi* h (PWi*)) And check (Bi = Bi*) Bi stores in smart card. Therefore, it s also resistance to denial-of service. 3. Resistance to Insider Attack- If a privileged insider of the Server Si obtains the smart card s secret information {Ai, Bi} from user Ui. He cannot extract sensitive information like {ID, PW,} from Bi. Bi = Ai h (ID h (PW)), Because it is computationally infeasible to invert the oneway hash function h (.) and also he cannot extract Bi without the knowing of ID and PW. 4. Resistance to Parallel Session Attack- If the attacker can masquerade as legitimate user Ui by a replaying a login request massage { ID i, C i, E i, Z i } within the valid time frame window But attacker cannot compute the knowledge massage { F i, Z j } because knowledge massage does not contains any information to construct next process. C i = h (PW i ') h(a i N i ) (D i N i B i ') Z i = N i A i F i = h (A i B i ' N i N j ) E i = h Z j = N j A i Hence the proposed protocol is secure against parallel session attack. 5. Resistance to Replay Attack- Suppose attacker intercepts the login request massage {ID i, C i, E i, Z i } from User U, and can replay the same massage to server, it is useless because the card reader used the random nonce value Ni in each new login request, Z i = N i A i Zi makes the dynamic and different login massage for same user for different login request. Hence the proposed protocol is secure against massage replay attack 6. Resistance to Offline password guessing Attack - In the proposed protocol, if an adversary wants to guess the password. It can be prove to be impossible. The adversary can guess ID and PW correctly at the same time. It is not possible to guess out two parameters correctly at the same time. An adversary cannot guess valid ID and PW for computes Ai = h (Xs) and Bi* = Ai h (IDi h (PWi)) Because it is impossible to guess right ID and PW in same time. Server Secret Key Xs protect with one-way function h (.), which computationally infeasible to invert. If attacker know user s ID, it s cannot extract h (ID h (PW)) without knowing server secret key. 7. Leak of Server secret key - Unfortunately, if Server secret key X is prevail from Server S. The attacker cannot retrieve ID and PW from Ai = h (Xs) Bi* = Ai h (IDi h (PWi)) Because of using one-way function h ( ), Server can easily change and modify its secret key X, and restore again in smart card. 5. THE PERFORMANCE AND EFFICIENCY COMPARISON In this section, we compare performance analysis of the proposed protocol with related protocol in terms of storage capacity and computation cost. The computation costs are focus on the registration, login and Volume 1, Issue 4 November - December 2012 Page 66

6 authentication phases. In our proposed protocol, we use the lightweight hash function and exclusive OR operation. It is usually take very low computation cost. We use SHA-1 to implement our protocol. The output sizes of each hash value of secret information is 160 bits long, time stamps are 40 bits length, and identity is 32 bits length. So the user s smart card memory needs 320(2*160) bits and server require only 160 bits to store the secret key X. Table 1 shows the storage capacity of our proposed protocol with other related protocol. Storage capacity (Bits) Smart Card Table 1.Comparision of storage capacity Our protocol R.Song et al. [18] Wang et al. [20] In terms of computation cost, it is defined as the total time of various operation executed in registration, login, and authentication phases. We denote the execution time for one-way hash function HT, and exclusive OR operation require very low execution time as compare to one-way hash function. So it is does consider its computation cost. Same related protocol use the modular exponential operation denotes as MT. the time complexity associated. This takes more execution time to perform modular operations. Table 2. Comparsion of computation cost. Yoon. Yoo et al. [6] Server comparison of our proposed protocol with related protocol. Our protocol takes little more computation in authentication phase to compare to R.Song et al. [18], Wang et al. [20], and Yoon. Yoo et al [6]. Because our proposed provides more security against parallel session attack, server spoofing attack, replay attack. Moreover, the security comparison of the proposed protocol with the relevant authentication protocol is summarized in Table 3. Resistance to / Protocol Our Protoc ol R.Song et al. [18] Wang et al. [20] Yoon Yoo et. al [6] Insider attack Yes No Yes No Masquerade attack Yes Yes No No Parallel session attack Yes No Yes No Replay attack Yes No Yes Yes Offline password attack Yes No No No Secure password Yes Yes No Yes change process Denial of service Yes No No No Session key generation and Yes Yes No No agreement Mutual Authentication Yes Yes weak Yes Computatio n cost in phases Registration Login Authenticati on Mutual authenticati on Session key Our protocol R.Song et al. [18] Wang et al. [20] Yoon. Yoo et al[6] 2 HT 1HT +1MT 1 HT 2 HT 4 HT 3 HT 1 HT 2 HT 5 HT 3 HT +1MT 3 HT 3 HT 1 HT 1 HT 1 HT 1 HT 1 HT 1 HT No No The proposed protocol requires little more and same computation cost to comparison other related protocol. Because of our protocol is resistance to various attacks and same security enhancement. Most related protocols do not satisfy various requirements such as denial-of service, mutual authentication, secure session key agreement. Table 2 shows the computation cost 6. CONCLUSION This paper point out that the protocols proposed by Yoon and Yoo [6], H.T. Liaw [7], M.S. Hwang and Lee [13], M.K. Das [15], R. Song [18], Y. Wang [20], Zhuo Hao [26] are not secure enough against some weaknesses. We showed that their protocols are vulnerable to denial-of service attacks, forgery attacks, insider attacks, password guessing, parallel session attacks, server spoofing, forward Security, replay attacks, and stolen verifier attacks. All necessary requirements and withstands the various aforementioned attacks, we present our proposed smart card based secure remote authentication protocol in section 3. Our proposed protocol resists most current possible attacks that show on security analysis in section 4. In section 5, the performance analysis of our protocol is shown in terms of computation cost and storage capacity. We use one-way hash function in our research. This is most suitable to use in cryptography, because it is low cost, not reversible and two different parameters cannot have same hash value. Because it provides better authentication mechanisms. In future, we suggest more secure and efficient authentication protocol using smart Volume 1, Issue 4 November - December 2012 Page 67

7 card whose computational cost is very low and resists to all possible attacks. REFERENCES [1] B. Schneier, Applied cryptography protocols, algorithms and source code in C: second edition, John Wiley & Sons Inc, 1995 [2] Chi - Kwong and Cheng, cryptanalysis of a remote user authentication scheme using smart card, IEEE Transaction on Consumer Electronic Vol.46, No.4, 11, [3] Chun-Ta Li and Cheng-Chi Lee, 2011 a robust remote user authentication scheme using smart card, Information Technology and Control,Vol.40,No.3 [4] Debasis Giri and P.D.Srivastava, Crpytoanalysis and Improvement of a remote user authentication scheme using smart card, ISECS 2008, IEEE /08, 2008 [5] Eun-Jun Yoon, and Kee-Young Yoo, 2011, Three Attacks on Jia et al. s Remote User Authentication Scheme using Bilinear Pairings and ECC, World Academy of Science, Engineering and Technology 60 (JULY 2011). [6] E.Yoon and Yoo, More efficient and secure remote user authentication scheme using smart card, in proceeding of 11th international conference on Parallel and Distributed System,2005,pp [7] H. T. Liaw, F. Lin, and W. C. Wu, "An efficient and complete remote user authentication scheme using smart cards, Math. Computer Model, Elsevier vol. 44, no. 1-2, pp , [8] Huang Kai, Ou Qingyu, Cryptanalysis of a remote user authentication scheme IEEE /09, 2009 [9] H.Y. Chien and C.H. Chen, 2005 A remote authentication scheme preserving user anonymity, proc. advanced information networking and application, vol.2.pp , march. [10] J. Xu, W.-T. Zhu and D.G. Feng, An improved smart card based password authentication scheme with provable security, Computer Standards & Interfaces, vol. 31, no. 4, pp , [11] L. I. Hu, X.X. Niu, and Y.X. Yang, 2007 Weaknesses and improvements of a remote user authentication scheme using smart cards, The Journal of China Universities of Posts and Telecommunications, vol. 14, pp [12] L. Lamport, 1981 Password authentication with insecure communication. Communications of the ACM, vol.24, no.11,, pp [13] M. S. Hwang, C. C. Lee, and Y. L. Tang, A simple remote user Authentication scheme, Mathematical and Computer Modeling, 36, pp , [14] M. S. Hwang and L.H.Li. A new remote user authentication scheme using smart card, In IEEE Transaction on consumer Eleclronic, vol.40, no 1, 2000, pp [15] M.L. Das, A.Saxena and V.P. Gulati, A Dynamic ID-based remote user authentication scheme, IEEE Transaction on consumer Eleectronice, vol. 50,2004, pp [16] Ou Qingyu Huang Kai, Cryptanalysis and improvement of a remote user authentication scheme IEEE /09, 2009 [17] Rafael M., F. Rico-Novella, Improvement of the Dynamic ID-based Remote User authentication scheme IEEE /03, 2010 [18] R. Song. Advanced smart card based password authentication Protocoll. Computer Standards & Interfaces, Volume 32, Issue 4, June 2010, Pages [19] Sandeep K. Sood, Anil K.Sarje and Kuldip Singh, "Secure dynamic identity-based remote user authentication scheme", Distributed Computing and Internet Technology, Lecture Notes in Computer Science, vol. 5966,2010, pp [20] Y. Wang, J. Liu, F. Xiao, and J. Dan, A more efficient and secure dynamic id-based remote user authentication scheme, Comput. Commun., vol. 32, no. 4, pp , [21] W.B. Horng and Cheng p Lee, Security weaknesses of song s Advanced smart card based Password authentication Protocol. IEEE trans. Computer, vol /10, 2010 [22] William Stallings. Cryptography and Network Security, 4/E Prentice Hall. [23] X. Duan, J. Liu, and Q. Zhang, Security improvement on chien et al. s remote user authentication scheme using smart cards, in Computational Intelligence and Security, 2006 International Conference on, vol. 2, pp , Nov [24] Y. Lee, J. Nam, and D. Won, Vulnerabilities in a remote agent authentication scheme using smart cards, N. T. Nguyen et al. (eds.) KES AMSTA 2008, LNAI 4953, pp , Springer Verlag Berlin Heidelberg [25] Z. Jia, Y. Zhang, H. Shao, Y. Lin and J. Wang 2006, A remote user authentication scheme using bilinear pairings and ECC, Proceeding Of 6th International Conference on Intelligent Systems Volume 1, Issue 4 November - December 2012 Page 68

8 Design and Applications (ISDA 06), Vol.2, Oct., pp [26] Zhuo Hao, Nenghai Yu, A Security Enhanced remote user authentication scheme using smart card International Symp. On Data, privacy, and E- commerce ISDPE, IEEE /10, 2010 Volume 1, Issue 4 November - December 2012 Page 69

Remote User Authentication Scheme in Multi-server Environment using Smart Card

Remote User Authentication Scheme in Multi-server Environment using Smart Card Remote User Authentication Scheme in Multi-server Environment using Smart Card Jitendra Kumar Tyagi A.K. Srivastava Pratap Singh Patwal ABSTRACT In a single server environment, one server is responsible

More information

An Enhanced Dynamic Identity Based Remote User Authentication Scheme Using Smart Card without a Verification Table

An Enhanced Dynamic Identity Based Remote User Authentication Scheme Using Smart Card without a Verification Table An Enhanced Dynamic Identity Based Remote User Authentication Scheme Using Smart Card without a Verification Table B. Sumitra, Research Scholar, Christ University, Bangalore, India (*Corresponding Author)

More information

Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement

Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement 1 Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement Sonam Devgan Kaul, Amit K. Awasthi School of Applied Sciences, Gautam Buddha University, Greater Noida, India sonamdevgan11@gmail.com,

More information

An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol

An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol International Journal of Network Security, Vol.14, No.1, PP.39 46, Jan. 2012 39 An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol Sandeep Kumar Sood Department of Computer

More information

Security Improvements of Dynamic ID-based Remote User Authentication Scheme with Session Key Agreement

Security Improvements of Dynamic ID-based Remote User Authentication Scheme with Session Key Agreement Security Improvements of Dynamic ID-based Remote User Authentication Scheme with Session Key Agreement Young-Hwa An* * Division of Computer and Media Information Engineering, Kangnam University 111, Gugal-dong,

More information

A Smart Card Based Authentication Protocol for Strong Passwords

A Smart Card Based Authentication Protocol for Strong Passwords A Smart Card Based Authentication Protocol for Strong Passwords Chin-Chen Chang 1,2 and Hao-Chuan Tsai 2 1 Department of Computer Science and Information Engineering, Feng Chia University, Taichung, Taiwan,

More information

On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme

On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme MING LIU * Department of Tourism Management WEN-GONG SHIEH Department of Information Management Chinese Culture University

More information

An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings

An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings Debasis Giri and P. D. Srivastava Department of Mathematics Indian Institute of Technology, Kharagpur 721 302, India

More information

Cryptanalysis and Improvement of a Dynamic ID Based Remote User Authentication Scheme Using Smart Cards

Cryptanalysis and Improvement of a Dynamic ID Based Remote User Authentication Scheme Using Smart Cards Journal of Computational Information Systems 9: 14 (2013) 5513 5520 Available at http://www.jofcis.com Cryptanalysis and Improvement of a Dynamic ID Based Remote User Authentication Scheme Using Smart

More information

A ROBUST AND FLEXIBLE BIOMETRICS REMOTE USER AUTHENTICATION SCHEME. Received September 2010; revised January 2011

A ROBUST AND FLEXIBLE BIOMETRICS REMOTE USER AUTHENTICATION SCHEME. Received September 2010; revised January 2011 International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 5(A), May 2012 pp. 3173 3188 A ROBUST AND FLEXIBLE BIOMETRICS REMOTE USER

More information

Security Flaws of Cheng et al. s Biometric-based Remote User Authentication Scheme Using Quadratic Residues

Security Flaws of Cheng et al. s Biometric-based Remote User Authentication Scheme Using Quadratic Residues Contemporary Engineering Sciences, Vol. 7, 2014, no. 26, 1467-1473 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49118 Security Flaws of Cheng et al. s Biometric-based Remote User Authentication

More information

Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme

Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme Y.. Lee Department of Security Technology and Management WuFeng niversity, hiayi, 653, Taiwan yclee@wfu.edu.tw ABSTRAT Due

More information

An Efficient and Secure Multi-server Smart Card based Authentication Scheme

An Efficient and Secure Multi-server Smart Card based Authentication Scheme An Efficient Secure Multi-server Smart Card based Authentication Scheme Toshi Jain Department of r Science Engineering Oriental Institute of Science & Technology Bhopal, India Seep Pratap Singh Department

More information

A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS

A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2012, Vol.41, No.1 A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS Bae-Ling Chen 1, Wen-Chung Kuo 2*, Lih-Chyau Wuu 3 1

More information

An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards

An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards Al-Sakib Khan Pathan and Choong Seon Hong Department of Computer Engineering, Kyung Hee University, Korea spathan@networking.khu.ac.kr

More information

Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards

Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards Younghwa An Computer Media Information Engineering, Kangnam University, 111, Gugal-dong, Giheung-gu, Yongin-si,

More information

Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment

Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment Archana P.S, Athira Mohanan M-Tech Student [Cyber Security], Sree Narayana Gurukulam College of Engineering Ernakulam,

More information

Efficient remote mutual authentication and key agreement

Efficient remote mutual authentication and key agreement computers & security 25 (2006) 72 77 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/cose Efficient remote mutual authentication and key agreement Wen-Gong Shieh*, Jian-Min

More information

Improved Remote User Authentication Scheme Preserving User Anonymity

Improved Remote User Authentication Scheme Preserving User Anonymity 62 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.3, March 28 Improved Remote User Authentication Scheme Preserving User Anonymity Mrs. C. Shoba Bindu, Dr P. Chandra Sekhar

More information

Comparative Analysis of Smart Card Authentication Schemes

Comparative Analysis of Smart Card Authentication Schemes IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. IV (Jan. 2014), PP 91-97 Comparative Analysis of Smart Card Authentication Schemes Toshi jain

More information

Security Vulnerabilities of User Authentication Scheme Using Smart Card

Security Vulnerabilities of User Authentication Scheme Using Smart Card Security Vulnerabilities of User Authentication Scheme Using Smart Card Ravi Pippal, Jaidhar C.D., Shashikala Tapaswi To cite this version: Ravi Pippal, Jaidhar C.D., Shashikala Tapaswi. Security Vulnerabilities

More information

The Modified Scheme is still vulnerable to. the parallel Session Attack

The Modified Scheme is still vulnerable to. the parallel Session Attack 1 The Modified Scheme is still vulnerable to the parallel Session Attack Manoj Kumar Department of Mathematics, Rashtriya Kishan (P.G.) College Shamli- Muzaffarnagar-247776 yamu_balyan@yahoo.co.in Abstract

More information

Efficient password authenticated key agreement using bilinear pairings

Efficient password authenticated key agreement using bilinear pairings Mathematical and Computer Modelling ( ) www.elsevier.com/locate/mcm Efficient password authenticated key agreement using bilinear pairings Wen-Shenq Juang, Wei-Ken Nien Department of Information Management,

More information

Cryptanalysis on Four Two-Party Authentication Protocols

Cryptanalysis on Four Two-Party Authentication Protocols Cryptanalysis on Four Two-Party Authentication Protocols Yalin Chen Institute of Information Systems and Applications, NTHU, Tawain d949702@oz.nthu.edu.tw Jue-Sam Chou * Dept. of Information Management

More information

A SMART CARD BASED AUTHENTICATION SCHEME FOR REMOTE USER LOGIN AND VERIFICATION. Received April 2011; revised September 2011

A SMART CARD BASED AUTHENTICATION SCHEME FOR REMOTE USER LOGIN AND VERIFICATION. Received April 2011; revised September 2011 International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 8, August 2012 pp. 5499 5511 A SMART CARD BASED AUTHENTICATION SCHEME FOR

More information

A robust smart card-based anonymous user authentication protocol for wireless communications

A robust smart card-based anonymous user authentication protocol for wireless communications University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2014 A robust smart card-based anonymous user authentication

More information

The Password Change Phase is Still Insecure

The Password Change Phase is Still Insecure Manoj Kumar: The password change phase change is still insecure 1 The Password Change Phase is Still Insecure Manoj Kumar!"#$ %&''%% E. Mail: yamu_balyan@yahoo.co.in Abstract In 2004, W. C. Ku and S. M.

More information

An efficient and practical solution to secure password-authenticated scheme using smart card

An efficient and practical solution to secure password-authenticated scheme using smart card An efficient and practical solution to secure password-authenticated scheme using smart card R. Deepa 1, R. Prabhu M.Tech 2, PG Research scholor 1, Head of the Department 2 Dept.of Information Technology,

More information

Comments on four multi-server authentication protocols using smart card

Comments on four multi-server authentication protocols using smart card Comments on four multi-server authentication protocols using smart card * Jue-Sam Chou 1, Yalin Chen 2, Chun-Hui Huang 3, Yu-Siang Huang 4 1 Department of Information Management, Nanhua University Chiayi

More information

Secure and Efficient Smart Card Based Remote User Password Authentication Scheme

Secure and Efficient Smart Card Based Remote User Password Authentication Scheme International Journal of Network Security, Vol.18, No.4, PP.782-792, July 2016 782 Secure and Efficient Smart Card Based Remote User Password Authentication Scheme Jianghong Wei, Wenfen Liu and Xuexian

More information

Cryptanalysis of a Markov Chain Based User Authentication Scheme

Cryptanalysis of a Markov Chain Based User Authentication Scheme Cryptanalysis of a Markov Chain Based User Authentication Scheme Ruhul Amin, G.P. Biswas Indian School of Mines, Dhanbad Department of Computer Science & Engineering Email: amin ruhul@live.com, gpbiswas@gmail.com

More information

Security Improvement of Two Dynamic ID-based Authentication Schemes by Sood-Sarje-Singh

Security Improvement of Two Dynamic ID-based Authentication Schemes by Sood-Sarje-Singh Security Improvement of Two Dynamic ID-based Authentication Schemes by Sood-Sarje-Singh R. Martínez-Peláez *1, F. Rico-Novella 2, J. Forné 2, P. Velarde-Alvarado 3 1 Institute of Informatics University

More information

ISSN X INFORMATION TECHNOLOGY AND CONTROL, 2011, Vol.40, No.3. ISSN X INFORMATION TECHNOLOGY AND CONTROL, 2011 Vol.?, No.?, 1?

ISSN X INFORMATION TECHNOLOGY AND CONTROL, 2011, Vol.40, No.3. ISSN X INFORMATION TECHNOLOGY AND CONTROL, 2011 Vol.?, No.?, 1? ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2011, Vol.40, No.3 ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2011 Vol.?, No.?, 1? A ROBUST A Robust REMOTE RemoteUSER User Authentication AUTHENTICATION

More information

A flexible biometrics remote user authentication scheme

A flexible biometrics remote user authentication scheme Computer Standards & Interfaces 27 (2004) 19 23 www.elsevier.com/locate/csi A flexible biometrics remote user authentication scheme Chu-Hsing Lin*, Yi-Yi Lai Department of Computer Science and Information

More information

A Multi-function Password Mutual Authentication Key Agreement Scheme with Privacy Preservingg

A Multi-function Password Mutual Authentication Key Agreement Scheme with Privacy Preservingg Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 2, April 2014 A Multi-function Password Mutual Authentication Key Agreement

More information

DEFENSE AGAINST PASSWORD GUESSING ATTACK IN SMART CARD

DEFENSE AGAINST PASSWORD GUESSING ATTACK IN SMART CARD DEFENSE AGAINST PASSWORD GUESSING ATTACK IN SMART CARD A. Shakeela Joy., Assistant Professor in Computer Science Department Loyola Institute of Technology of Science Dr. R. Ravi., Professor & Research

More information

An Enhanced Remote User Authentication Scheme with Smart Card

An Enhanced Remote User Authentication Scheme with Smart Card International Journal of Network Security, Vol.10, No.3, PP.175 184, May 2010 175 An Enhanced Remote User Authentication Scheme with Smart Card Manoj Kumar Department of Mathematics, Rashtriya Kishan College

More information

Cryptanalysis of a timestamp-based password authentication scheme 1

Cryptanalysis of a timestamp-based password authentication scheme 1 Cryptanalysis of a timestamp-based password authentication scheme 1 Lizhen Yang a Kefei Chen a a Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200030, P.R.China

More information

A Hash-based Strong Password Authentication Protocol with User Anonymity

A Hash-based Strong Password Authentication Protocol with User Anonymity International Journal of Network Security, Vol.2, No.3, PP.205 209, May 2006 (http://isrc.nchu.edu.tw/ijns/) 205 A Hash-based Strong Password Authentication Protocol with User Anonymity Kumar Mangipudi

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014 Two Way User Authentication Using Biometric Based Scheme for Wireless Sensor Networks Srikanth S P (Assistant professor, CSE Department, MVJCE, Bangalore) Deepika S Haliyal (PG Student, CSE Department,

More information

Cryptanalysis of An Advanced Temporal Credential- Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks

Cryptanalysis of An Advanced Temporal Credential- Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks Cryptanalysis of An Advanced Temporal Credential- Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks Chandra Sekhar Vorugunti 1, Mrudula Sarvabhatla 2 1 Dhirubhai

More information

An Enhanced Remote User Authentication Scheme with Smart Card

An Enhanced Remote User Authentication Scheme with Smart Card An Enhanced Remote User Authentication Scheme with Smart Card Manoj Kumar Department of Mathematics R. K. College Shamli-Muzaffarnagar U.P.-India- 247776 E-mail: yamu balyan@yahoo.co.in Abstract In 2000,

More information

A Simple User Authentication Scheme for Grid Computing

A Simple User Authentication Scheme for Grid Computing A Simple User Authentication Scheme for Grid Computing Rongxing Lu, Zhenfu Cao, Zhenchuai Chai, Xiaohui Liang Department of Computer Science and Engineering, Shanghai Jiao Tong University 800 Dongchuan

More information

Robust EC-PAKA Protocol for Wireless Mobile Networks

Robust EC-PAKA Protocol for Wireless Mobile Networks International Journal of Mathematical Analysis Vol. 8, 2014, no. 51, 2531-2537 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijma.2014.410298 Robust EC-PAKA Protocol for Wireless Mobile Networks

More information

A New Secure Mutual Authentication Scheme with Smart Cards Using Bilinear Pairings

A New Secure Mutual Authentication Scheme with Smart Cards Using Bilinear Pairings International Journal of Mathematical Analysis Vol. 8, 2014, no. 43, 2101-2107 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijma.2014.48269 A New Secure Mutual Authentication Scheme with Smart

More information

Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards

Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards Ding Wang, Chun-Guang Ma, Peng Wu To cite this version: Ding Wang, Chun-Guang Ma, Peng Wu. Secure Password-Based

More information

A Simple User Authentication Scheme for Grid Computing

A Simple User Authentication Scheme for Grid Computing International Journal of Network Security, Vol.7, No.2, PP.202 206, Sept. 2008 202 A Simple User Authentication Scheme for Grid Computing Rongxing Lu, Zhenfu Cao, Zhenchuan Chai, and Xiaohui Liang (Corresponding

More information

A Simple Password Authentication Scheme Based on Geometric Hashing Function

A Simple Password Authentication Scheme Based on Geometric Hashing Function International Journal of Network ecurity, Vol.16, No.3, PP.237-243, May 2014 237 A imple Password Authentication cheme Based on Geometric Hashing Function Xu Zhuang 1, Chin-Chen Chang 2,3, Zhi-Hui Wang

More information

Cryptanalysis and Improvement of a New. Ultra-lightweight RFID Authentication. Protocol with Permutation

Cryptanalysis and Improvement of a New. Ultra-lightweight RFID Authentication. Protocol with Permutation Applied Mathematical Sciences, Vol. 7, 2013, no. 69, 3433-3444 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.211587 Cryptanalysis and Improvement of a New Ultra-lightweight RFID Authentication

More information

An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks

An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks Ad Hoc & Sensor Wireless Networks, Vol. 10, pp. 361 371 Reprints available directly from the publisher Photocopying permitted by license only 2010 Old City Publishing, Inc. Published by license under the

More information

Secure Password-based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards

Secure Password-based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards Secure Password-based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards Ding Wang 1,2, Chun-guang Ma 1,, and Peng Wu 1 1 Harbin Engineering University, Harbin City 150001, China 2

More information

Robust Two-factor Smart Card Authentication

Robust Two-factor Smart Card Authentication Robust Two-factor Smart Card Authentication Omer Mert Candan Sabanci University Istanbul, Turkey mcandan@sabanciuniv.edu Abstract Being very resilient devices, smart cards have been commonly used for two-factor

More information

A Novel Smart Card Authentication Scheme using Image Watermarking

A Novel Smart Card Authentication Scheme using Image Watermarking A Novel Smart Card Authentication Scheme using Image Watermarking Mr. Saurabh Garg ME CSE MPCT GWALIOR Prof. Pradeep Gupta HEAD CSE & IT GIIT GWALIOR Abstract One of the primary issues of information technology

More information

Expert Systems with Applications

Expert Systems with Applications Expert Systems with Applications 38 (2011) 13863 13870 Contents lists available at ScienceDirect Expert Systems with Applications journal homepage: www.elsevier.com/locate/eswa A secure dynamic ID based

More information

An Efficient Trust Model for Online Application using 2-Factor Authentication and Token Based Authentication

An Efficient Trust Model for Online Application using 2-Factor Authentication and Token Based Authentication An Efficient Trust Model for Online Application using 2-Factor Authentication and Token Based Authentication Varsha Jotwani 1, Dr. Amit Dutta 2 1 Research Scholar, AISECT University, Department of Computer

More information

An Improvement on Remote User Authentication Schemes Using Smart Cards

An Improvement on Remote User Authentication Schemes Using Smart Cards Article An Improvement on Remote User Authentication Schemes Using Smart Cards Chin-Ling Chen 1,2, *, Yong-Yuan Deng 1, Yung-Wen Tang 3, Jung-Hsuan Chen 4 and Yu-Fan Lin 1 1 Department of Computer Science

More information

Available online at ScienceDirect. Procedia Computer Science 78 (2016 ) 95 99

Available online at  ScienceDirect. Procedia Computer Science 78 (2016 ) 95 99 Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 78 (2016 ) 95 99 International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015, Nagpur, INDIA

More information

Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks

Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks Sensors 2014, 14, 6443-6462; doi:10.3390/s140406443 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Security Analysis and Improvements of Two-Factor Mutual Authentication with Key

More information

Cryptanalysis and improvement of passwordauthenticated key agreement for session initiation protocol using smart cards

Cryptanalysis and improvement of passwordauthenticated key agreement for session initiation protocol using smart cards SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2014; 7:2405 2411 Published online 17 January 2014 in Wiley Online Library (wileyonlinelibrary.com)..951 RESEARCH ARTICLE Cryptanalysis and improvement

More information

An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System

An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System sensors Article An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System Chun-Ta Li 1, Tsu-Yang Wu 2,3,, Chin-Ling Chen 4,5,, Cheng-Chi Lee 6,7

More information

Improvement of recently proposed Remote User Authentication Schemes

Improvement of recently proposed Remote User Authentication Schemes Improvement of recently proposed Remote User Authentication Schemes Guanfei Fang and Genxun Huang Science Institute of Information Engineering University, Zhengzhou, 450002, P.R.China feifgf@163.com Abstract

More information

Cryptanalysis of Blind Signature Schemes

Cryptanalysis of Blind Signature Schemes IJCSNS International Journal of Computer Science and Network Security, VOL.14 No.5, May 2014 73 Cryptanalysis of Blind Signature Schemes Nitu Singh M.Tech Scholar Dept. of Cmputer Science & Engineering

More information

Cryptanalysis on Efficient Two-factor User Authentication Scheme with Unlinkability for Wireless Sensor Networks

Cryptanalysis on Efficient Two-factor User Authentication Scheme with Unlinkability for Wireless Sensor Networks Cryptanalysis on Efficient Two-factor User Authentication Scheme with Unlinkability for Wireless Sensor Networks Hae-Won Choi 1, Hyunsung Kim 2,3, 1 Department of Computer Engineering, Kyungwoon University,

More information

An Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards

An Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards An Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards Chun-Ta Li 1 and Min-Shiang Hwang 2 1 Department of Information Management, Tainan University of Technology, 529 Jhong

More information

Article An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks

Article An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks Article An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks Youngseok Chung 1,2, Seokjin Choi 1, Youngsook Lee 3, Namje Park

More information

Weaknesses of Temporal Credential-Based Mutual Authentication with a Multiple-Password Scheme for Wireless Sensor Networks

Weaknesses of Temporal Credential-Based Mutual Authentication with a Multiple-Password Scheme for Wireless Sensor Networks Weaknesses of Temporal Credential-Based Mutual Authentication with a Multiple-Password Scheme for Wireless Sensor Networks Younsung Choi Department of Cyber Security, Howon University, 64, 3-gil, Gunsan,

More information

Analysis and enhancements of an efficient biometricbased remote user authentication scheme using smart cards

Analysis and enhancements of an efficient biometricbased remote user authentication scheme using smart cards Analysis and enhancements of an efficient biometricbased remote user authentication scheme using smart cards Sana Ibjaoun 1,2, Anas Abou El Kalam 1, Vincent Poirriez 2 1 University Cadi Ayyad, Marrakesh,

More information

Mixed Symmetric Key and Elliptic Curve Encryption Scheme Used for Password Authentication and Update Under Unstable Network Environment

Mixed Symmetric Key and Elliptic Curve Encryption Scheme Used for Password Authentication and Update Under Unstable Network Environment Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 3, May 2017 Mixed Symmetric Key and Elliptic Curve Encryption Scheme Used

More information

arxiv: v1 [cs.cr] 9 Jan 2018

arxiv: v1 [cs.cr] 9 Jan 2018 An efficient and secure two-party key agreement protocol based on chaotic maps Nahid Yahyapoor a, Hamed Yaghoobian b, Manijeh Keshtgari b a Electrical Engineering, Khavaran Institute of Higher Education,

More information

A strong password-based remote mutual authentication with key agreement scheme on elliptic curve cryptosystem for portable devices

A strong password-based remote mutual authentication with key agreement scheme on elliptic curve cryptosystem for portable devices Appl. Math. Inf. Sci. 6, No. 2, 217-222 (2012) 217 Applied Mathematics & Information Sciences An International Journal A strong password-based remote mutual authentication with key agreement scheme on

More information

Enhanced Delegation Based Authentication Protocol for Secure Roaming Service with Synchronization

Enhanced Delegation Based Authentication Protocol for Secure Roaming Service with Synchronization JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 2011 345 Enhanced Delegation Based Authentication Protocol for Secure Roaming Service with Synchronization Hsing-Bai Chen, Yung-Hsiang

More information

A LITERATURE SURVEY ON NOVEL REMOTE AUTHENTICATION VIA VIDEO OBJECT AND BIOMETRICS

A LITERATURE SURVEY ON NOVEL REMOTE AUTHENTICATION VIA VIDEO OBJECT AND BIOMETRICS A LITERATURE SURVEY ON NOVEL REMOTE AUTHENTICATION VIA VIDEO OBJECT AND BIOMETRICS T.Sathya, T.Krishnan, 1 PG Student, SASURIE Academy Of Engineering, Coimbatore 2 Assistant Professor Sasurie Academy Of

More information

A weakness in Sun-Chen-Hwang s three-party key agreement protocols using passwords

A weakness in Sun-Chen-Hwang s three-party key agreement protocols using passwords A weakness in Sun-Chen-Hwang s three-party key agreement protocols using passwords Junghyun Nam Seungjoo Kim Dongho Won School of Information and Communication Engineering Sungkyunkwan University 300 Cheoncheon-dong

More information

On the security of a certificateless signature scheme in the standard model

On the security of a certificateless signature scheme in the standard model On the security of a certificateless signature scheme in the standard model Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang State Key Laboratory of Networking and Switch Technology, Beijing University

More information

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Li-Chin Huang and Min-Shiang Hwang 1 Department of Computer Science and Engineering,

More information

An Improvement on the Self-Verification Authentication Mechanism for A Mobile Satellite Communication System

An Improvement on the Self-Verification Authentication Mechanism for A Mobile Satellite Communication System Appl. Math. Inf. Sci. 8, No. 1L, 97-106 (2014) 97 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/081l13 An Improvement on the Self-Verification Authentication

More information

Academia Arena 2018;10(6) Campus, Niayesh Blvd., Kish Island, Iran

Academia Arena 2018;10(6)   Campus, Niayesh Blvd., Kish Island, Iran Cryptanalysis of Tang et al. s ECC-based mutual authentication scheme for SIP 1 Samaneh Sadat Mousavi Nik*, 2 Amir Safdari 1 MSC in department of Engineering, Security in Information Technology, University

More information

Enhanced three factor security protocol for consumer USB mass storage devices

Enhanced three factor security protocol for consumer USB mass storage devices Enhanced three factor security protocol for consumer SB mass storage devices Article Accepted Version He, D., umar, N., Lee, J. H. and Sherratt, R. S. (2014) Enhanced three factor security protocol for

More information

Secure Communication in Digital TV Broadcasting

Secure Communication in Digital TV Broadcasting IJN International Journal of omputer cience and Network ecurity, VOL.8 No.9, eptember 2008 ecure ommunication in Digital TV Broadcasting Hyo Kim Division of Digital Media, Ajou University, Korea ummary

More information

Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors

Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors computers Article Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors Ali A. Yassin 1,2, Jian Yao 1, and Shiyao Han 1 1 School of Remote Sensing and Information Engineering, Wuhan

More information

A Secure and Efficient One-time Password Authentication Scheme for WSN

A Secure and Efficient One-time Password Authentication Scheme for WSN International Journal of Network Security, Vol.19, No.2, PP.177-181, Mar. 2017 (DOI: 10.6633/IJNS.201703.19(2).02) 177 A Secure and Efficient One-time Password Authentication Scheme for WSN Chung-Huei

More information

Security of the Lin-Lai smart card based user authentication scheme

Security of the Lin-Lai smart card based user authentication scheme Security of the Lin-Lai smart card based user authentication scheme Chris J. Mitchell and Qiang Tang Technical Report RHUL MA 2005 1 27 January 2005 Royal Holloway University of London Department of Mathematics

More information

PAPER Further Improved Remote User Authentication Scheme

PAPER Further Improved Remote User Authentication Scheme 1426 IEICE TRANS. FUNDAMENTALS, VOL.E94 A, NO.6 JUNE 2011 PAPER Further Improved Remote User Authentication Scheme Jung-Yoon KIM a), Student Member, Hyoung-Kee CHOI, Member, and John A. COPELAND, Nonmember

More information

ScienceDirect. A Secure and Light Weight Authentication Service in Hadoop using One Time Pad

ScienceDirect. A Secure and Light Weight Authentication Service in Hadoop using One Time Pad Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 50 (2015 ) 81 86 2nd International Symposium on Big Data and Cloud Computing (ISBCC 15) A Secure and Light Weight Authentication

More information

Issues. Separation of. Distributed system security. Security services. Security policies. Security mechanism

Issues. Separation of. Distributed system security. Security services. Security policies. Security mechanism Module 9 - Security Issues Separation of Security policies Precise definition of which entities in the system can take what actions Security mechanism Means of enforcing that policy Distributed system

More information

Three Party Authentication Scheme with Privacy in Telecare Medicine Information Systems

Three Party Authentication Scheme with Privacy in Telecare Medicine Information Systems Three Party Authentication Scheme with Privacy in Telecare Medicine Information Systems Hee Joo Park * * Department of Cyber Security, Kyungil University, Kyungsan, Kyungbuk 712-701, Korea. *Orcid ID:

More information

Research Issues and Challenges for Multiple Digital Signatures

Research Issues and Challenges for Multiple Digital Signatures INTERNATION JOURNAL OF NETWORK SECURITY, VOL.1, NO.1,PP. 1-6, 2005 1 Research Issues and Challenges for Multiple Digital Signatures Min-Shiang Hwang, and Cheng-Chi Lee, Abstract In this paper, we survey

More information

Cryptanalysis on Two Certificateless Signature Schemes

Cryptanalysis on Two Certificateless Signature Schemes Int. J. of Computers, Communications & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. V (2010), No. 4, pp. 586-591 Cryptanalysis on Two Certificateless Signature Schemes F. Zhang, S. Li, S. Miao, Y. Mu,

More information

SECURED PASSWORD MANAGEMENT TECHNIQUE USING ONE-TIME PASSWORD PROTOCOL IN SMARTPHONE

SECURED PASSWORD MANAGEMENT TECHNIQUE USING ONE-TIME PASSWORD PROTOCOL IN SMARTPHONE Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,

More information

A Novel Smart-Card Based Authentication Scheme Using Proactive Secret Sharing

A Novel Smart-Card Based Authentication Scheme Using Proactive Secret Sharing A Novel Smart-Card Based Authentication Scheme Using Proactive Secret Sharing Yuesheng Zhu, Bojun Wang*, Cheng Cai Lab of Communication and Information Security, Institute of Big Data Technologies, Shenzhen

More information

Provably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks *

Provably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 31, 727-742 (2015) Provably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks * KUO-YANG WU 1, KUO-YU TSAI 2, TZONG-CHEN

More information

Cryptanalysis of Some RFID Authentication Protocols

Cryptanalysis of Some RFID Authentication Protocols 20 JOURNAL OF COMMUNICATIONS, VOL. 3, NO. 7, DECEMBER 2008 Cryptanalysis of Some RFID Authentication Protocols Tianjie Cao, Peng Shen School of Computer, China University of Mining and Technology Sanhuannanlu,

More information

Journal of Discrete Mathematical Sciences & Cryptography Vol. ( ), No., pp. 1 10

Journal of Discrete Mathematical Sciences & Cryptography Vol. ( ), No., pp. 1 10 Randomizing encryption mode Yi-Shiung Yeh 1, I-Te Chen 1, Chan-Chi Wang 2, 1 Department of Computer Science and Information Engineering National Chiao-Tung University 1001 Ta Hsueh Road Hsinchu 30050 Taiwan

More information

Single Sign On Mechanism Implementation Using Java

Single Sign On Mechanism Implementation Using Java Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 10, October 2015,

More information

A secure and effective anonymous user authentication scheme for roaming service in global mobility networks

A secure and effective anonymous user authentication scheme for roaming service in global mobility networks University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2013 A secure and effective anonymous user authentication

More information

Lecture 1: Course Introduction

Lecture 1: Course Introduction Lecture 1: Course Introduction Thomas Johansson T. Johansson (Lund University) 1 / 37 Chapter 9: Symmetric Key Distribution To understand the problems associated with managing and distributing secret keys.

More information

A Secure Simple Authenticated Key Exchange Algorithm based Authentication for Social Network

A Secure Simple Authenticated Key Exchange Algorithm based Authentication for Social Network Journal of Computer Science 7 (8): 1152-1156, 2011 ISSN 1549-3636 2011 Science Publications A Secure Simple Authenticated Key Exchange Algorithm based Authentication for Social Network 1 P. Venkateswari

More information

On the Security of an Efficient Group Key Agreement Scheme for MANETs

On the Security of an Efficient Group Key Agreement Scheme for MANETs On the Security of an Efficient Group Key Agreement Scheme for MANETs Purushothama B R 1,, Nishat Koti Department of Computer Science and Engineering National Institute of Technology Goa Farmagudi, Ponda-403401,

More information

Password. authentication through passwords

Password. authentication through passwords Password authentication through passwords Human beings Short keys; possibly used to generate longer keys Dictionary attack: adversary tries more common keys (easy with a large set of users) Trojan horse

More information

Journal of Computer and System Sciences. Two-factor mutual authentication based on smart cards and passwords

Journal of Computer and System Sciences. Two-factor mutual authentication based on smart cards and passwords Journal of Computer and System Sciences 74 (2008) 1160 1172 Contents lists available at ScienceDirect Journal of Computer and System Sciences www.elsevier.com/locate/jcss Two-factor mutual authentication

More information