Cryptanalysis and Improvement of a Dynamic ID Based Remote User Authentication Scheme Using Smart Cards

Size: px
Start display at page:

Download "Cryptanalysis and Improvement of a Dynamic ID Based Remote User Authentication Scheme Using Smart Cards"

Transcription

1 Journal of Computational Information Systems 9: 14 (2013) Available at Cryptanalysis and Improvement of a Dynamic ID Based Remote User Authentication Scheme Using Smart Cards Chengbo XU 1,2,, Zhongtian JIA 3, Fengtong WEN 1, Yan MA 2 1 School of Mathematical Sciences, University of Jinan, Jinan , China 2 Institute of Network Technology Research, Beijing University of Posts and Telecommunications, Beijing , China 3 Shandong Provincial Key Laboratory of Network Based Intelligent Computing, Jinan , China Abstract Recently, Lee, Lai and Li proposed a dynamic identity based remote user authentication scheme using smart card to remedy the weaknesses of Lee-Lin-Chang s scheme. However, we find that Lee-Lai-Li s scheme is still insecure and vulnerable to offline dictionary attack. Besides, the scheme suffers from low efficiency in wrong password detection process and password change phase. To eliminate these weaknesses, we propose an improved scheme. Through comparative analysis, we illustrate that our proposed scheme is more secure and simultaneously keeps low cost. Keywords: Authentication; Dynamic Identity; Multi-server; Smart Card; Key Agreement 1 Introduction With the rapid growth of Internet, it becomes a very serious issue to authenticate the identity of a remote user in public environment before he/she can access a service [2]. To solve this problem, many authentication schemes have been proposed in literature. In 2009, Liao and Wang proposed a dynamic ID-based authentication scheme for multi-server environments [3]. They claimed that their scheme can resist various attacks and achieve mutual authentication. But Hsiang and Shih found that Liao-Wang s scheme is vulnerable to insider s attack, masquerade attack, server spoofing attack, registration center spoofing attack and is not reparable. Furthermore, Liao-Wang s scheme fails to provide mutual authentication [4]. To eliminate these weaknesses, Hsiang and Shih proposed an improved scheme [4]. Unfortunately, Hsiang-Shish s scheme was pointed out still not secure and susceptible to masquerade attack, server spoofing attack and is not easily reparable [1]. To remove these flaws, Lee, Lin and Chang proposed their improved schemes [1]. Recently, Lee, Lai and Li identified that Lee-Lin-Chang s Project partially supported by the Doctoral Fund of University of Jinan (Granted No.XBS0835), and the project of Jinan City Science and Technology Program (Granted No ). Corresponding author. address: cbqysy@gmail.com (Chengbo XU) / Copyright 2013 Binary Information Press DOI: /jcis6300 July 15, 2013

2 5514 C. Xu et al. /Journal of Computational Information Systems 9: 14 (2013) scheme still fails to achieve the anonymity and has the security weakness of a smart clone [5]. In addition, they proposed an improved scheme to remedy the weaknesses of Lee-Lin-Chang s scheme [5]. In this paper, we will show that Lee-Lai-Li s scheme suffers from offline dictionary attack, low efficiency in wrong password detection, low efficiency and inconveniency in password change phase. To remove these weaknesses, we propose an improved scheme. Through comparative analysis, we illustrate that the improved scheme is more secure and keeps low cost. The rest of this paper is organized as follows: in Section 2, we provide a brief review of Lee-Lai- Li s scheme. Section 3 points out the security weaknesses of Lee-Lai-Li s scheme. The proposed scheme and corresponding scheme analysis are presented in Sections 4 and 5 respectively. Finally, we conclude the paper in Section 6. The notations are summarized in Table 1. Table 1: Notations used in this paper U i The ith user x The master secret key maintained by RC S j The jth server b, b new Random numbers generated by user U i RC The registration center CID, CID new The dynamic identities generated by U i ID i The identity of the user U i SK A session key shared between the user and server P W i The password of the user U i h( ) A secure one-way hash function Exclusive-OR operation Message concatenation operation 2 Review of Lee-Lai-Li s Scheme In this section, we will review the Lee-Lai-Li s scheme briefly [5]. There are three entities involved in this scheme. i.e. the user (U i ), the remote server (S j ) and the registration center (RC). RC chooses the master key x which it itself knows only. And then RC computes and shares h(x) with each legal servers over a secure channel. 2.1 Registration phase Step 1 U i generates a random number b, and then chooses his/her identity ID i and password P W i. Next, U i computes CID = h(id i P W i ) b and sends it to RC. Step 2 Upon receiving CID, RC computes B i = h(cid h(x)) and sends {B i, h( )} back to U i. Step 3 When receiving {B i, h( )}, U i computes BP W = B i h(p W i ). Finally, U i stores {BP W, b, h( )} in the corresponding smart card. 2.2 Login and verification phase Step 1 U i inserts his/her smart card into a card reader and inputs the identity ID i and password P W i. Then the card computes CID = h(id i P W i ) b, B i = BP W h(p W i ) and gener-

3 C. Xu et al. /Journal of Computational Information Systems 9: 14 (2013) ates two random numbers, b new and N i. Next, U i computes CID new = h(id i P W i ) b new, V i = CID new h(b i N i ) and Q i = h(cid new B i N i ). Finally, U i submits the login request message {CID, V i, Q i, N i } to S j. Step 2 Upon receiving {CID, V i, Q i, N i }, S j computes B i = h(cid h(x)), CID new = V i h(b i N i ), and then checks Q i =?h(cid new B i N i ). If they are equal, S j generates a random number N j, computes B new = h(cid new h(x)), V j = B new h(b i N j ), Q j = h(cid B new N j ), and then sends {V j, Q j, N j } back to U i ; Otherwise, S j rejects this login request. Step 3 When receiving {V j, Q j, N j }, U i computes B new = V j h(b i N j ) and checks Q j =?h(cid B new N j ). If they are not equal, U i terminates the session; Otherwise, it means that U i authenticate S j. Then, U i computes BP W new = B new h(p W i ) and stores {BP W new, b new } for the next login. Next, U i computes the session key SK = h(n i N j B i ) and Q ij = h(n i B i N j B new ) which is sent to S j for double check. Step 4 Upon receiving Q ij, S j verifies Q ij =?h(n i B i N j B new ). If they are not equal, S j terminates the session; Otherwise, S j computes the session key SK = h(n i N j B i ). 2.3 Update session key phase Step 1 U i generates a random number Ni and computes Vi = Ni h(b i h(n i N j )), Q i = h(ni B i ). Then U i submits {Vi, Q i } to S j. Step 2 When receiving {Vi, Q i }, S j computes Ni = Vi h(b i h(n i N j )) and checks Q i =?h(ni B i ). If they are equal, S j generates a random number Nj, computes Vj = Nj h(b i h(n j N i )), Q j =?h(nj B i ), and then sends {Vj, Q j} to U i. Step 3 Upon receiving {V j, Q j}, U i computes N j = V j h(b i h(n j N i )) and checks whether Q j = h(n j B i ) or not. If they are equal, U i compute the new session key SK = h(n i N j B i ). And then U i computes Q ij = h(n i N j B i ) and sends it to S j. Step 4 When receiving Q ij, S j checks Q ij =?h(n i N j B i ). If they are equal, S j also updates the session key SK to SK = h(n i N j B i ); Otherwise, S j rejects the request. 2.4 Password change phase Step 1 U i inputs his/her identity ID i, password P W i, and chooses a new password P W new. Next, U i s smart card generates two random numbers b new and N i, and then computes CID = h(id i P W i ) b, B i = BP W h(p W i ), CID new = h(id i P W new ) b new, V i = CID new h(b i N i ), Q i = h(cid new B i N i ). Finally, U i submits message {CID, V i, Q i, N i } to S j.

4 5516 C. Xu et al. /Journal of Computational Information Systems 9: 14 (2013) Step 2 Upon receiving {CID, V i, Q i, N i }, S j computes B i = h(cid h(x)), CID new = V i h(b i N i ), and checks Q i =?h(cid new B i N i ). If they are equal, S j generates a nonce N j, computes B new = h(cid new h(x)), V j = B new h(b i N j ), Q j = h(cid B new N j ), and then sends {V j, Q j, N j } back to U i ; Otherwise, S j rejects this login request. Step 3 When receiving {V j, Q j, N j }, U i computes B new = V j h(b i N j ) and checks whether Q j = h(cid B new N j ) or not. If they are equal, it means that U i verifies the validity of S j. Then, U i computes BP W new = B new h(p W new ) and stores {BP W new, b new } for the next login. 3 Cryptanalysis of Lee-Lai-Li s Scheme In this section, we will analysis Lee-Lai-Li s scheme and point out this scheme suffers from offline dictionary attack, low efficiency in wrong password detection and password change phase. To illustrate logically, we firstly list the following three assumptions. Assumption 1. Since Internet is a public and open environment, we assume the channels between users and servers are insecure. The adversary can control the channels entirely. Assumption 2. Now, there are several methods by which an adversary can extract the information stored in smart cards, such as Kocher et al. [7]. Therefore, we assume the adversary has capability to extract the information stored in smart cards. Assumption 3. Due to the low entropy of ID i and P W i selected by U i, we assume an adversary is able to offline guess U i s identity ID i and password P W i individually. However, he/she cannot offline guess ID i and P W i simultaneously in polynomial time as pointed out by Sood et al. [6]. 3.1 Offline dictionary attack If the user U i s smart card is lost or stolen, the adversary obtains it. According to assumption 2, he/she has the capability to extract the information {BP W, b, h( )} stored in smart card. Once knowing these values, the adversary can launch an offline dictionary attack as follows: 1) Guesses a password P W i. 2) Computes B i = BP W h(p W i ) with the knowledge BP W. 3) Eavesdrops or intercepts a valid login message {CID, U i, Q i, N i } from the open channels. 4) Computes CID new = V i h(b i N i ), Q i = h(cid new B i N i ) and checks Q i =?Q i. If they are equal, it means that the guessed P W i is the real password P W i ; Otherwise, the adversary will repeat steps 1)-4) until the real password P W i is found. 5) After successfully guessing the real password P W i, the adversary computes h(id i P W i ) = CID b using the values CID and b. 6) Guesses an identity ID i. 7) Computes h(id i P W i ) and checks whether h(id i P W i ) = h(id i P W i ) or not. If they are equal, it means that the guessed identity ID i is the real identity ID i ; Otherwise, the adversary will repeat steps 6)-7) until the real identity ID i is guessed correctly. Possessing the real identity ID i and password P W i, this adversary has as same privilege as the user U i. He/She can do whatever the real user U i can do. Furthermore, the adversary can compute the real secret key B i. With the value B i, he/she can masquerade as S j to fool U i.

5 C. Xu et al. /Journal of Computational Information Systems 9: 14 (2013) Low efficiency in wrong password detection and password change phase In Lee-Lai-Li s scheme, there is no wrong password detection mechanism in smart cards. When the user U i inputs a wrong password by mistake in the login phase, the error will not be detected until the server S j checks whether Q i = Q i in the verification phase. As this, many computational and communicational resources are wasted. On the one hand, the password change phase of Lee-Lai-Li s scheme involves U i and S j two entities, instead of U i itself. So the user U i cannot finish updating his/her password offline. This is to some extent not convenient for the user U i. On the other hand, the user U i and server S j have to exchange and compute some messages when U i wants to update his/her password. This inevitably causes some additional delay and consequently decreases the scheme s efficiency. 4 Our Improved Scheme In this section, we will improve Lee-Lai-Li s scheme to eliminate all the weaknesses mentioned above. The improved scheme also involves three entities: the user (U i ), the server (S j ) and the registration center (RC), and includes five phases: the registration phase, the login phase, the verification phase, update session phase and password change phase. RC selects the master key x which is known only to RC. Next, RC computes h(x) and shares the knowledge with each legal server via a secure channel. 4.1 Registration phase Step 1 U i generates a random number b, and then chooses his/her identity ID i and password P W i. Next, U i computes CID = h(id i b) and sends it to RC. Step 2 Upon receiving CID from U i, RC computes B i = h(cid h(x)) and stores {CID, B i, h( )} in a smart card. Then RC issues the card to U i via a secure channel. Step 3 When receiving his/her smart card, U i inputs the identity ID i and password P W i. The smart card computes R i = h(p W i ID i ) and BP W = B i h(p W i ID i ). And then it stores R i and substitutes B i with BP W. Eventually, the smart card contains {CID, R i, BP W, h( )}. 4.2 Login and verification phase Step 1 U i inserts his/her smart card into a card reader and inputs the identity ID i and password P W i. Then the card computes R i = h(p W i ID i) and checks whether R i = R i or not. If they are not equal, the smart card rejects this login request; Otherwise, the card generates two random numbers b new and N i, and then computes B i = BP W h(p W i ID i ), CID new = h(cid b new ), V i = CID new h(b i N i ) and Q i = h(cid new B i N i ). Finally, U i sends {CID, V i, Q i, N i } to S j.

6 5518 C. Xu et al. /Journal of Computational Information Systems 9: 14 (2013) Step 2 Upon receiving {CID, V i, Q i, N i } from U i, S j computes B i = h(cid h(x)), CID new = V i h(b i N i ), and then checks Q i =?h(cid new B i N i ). If they are equal, S j generates a random number N j, computes B new = h(cid new h(x)), V j = B new h(b i N j ), Q j = h(cid B new N j ), and then sends {V j, Q j, N j } back to U i. Otherwise, S j rejects this login request. Step 3 When receiving {V j, Q j, N j }, U i computes B new = V j h(b i N j ) and checks whether Q j =?h(cid B new N j ) or not. If they are not equal, U i terminates the session. Otherwise, it means that U i authenticates the validity of S j. Then, U i computes BP W new = B new h(p W i ID i ) and stores {CID new, BP W new } for the next login. Next, U i computes the session key SK = h(n i N j B i ) and Q ij = h(n i B i N j B new ) which is sent to S j for double check. Step 4 Upon receiving Q ij, S j verifies Q ij =?h(n i B i N j B new ). If they are not equal, S j terminates the session; Otherwise, S j computes the session key SK = h(n i N j B i ). 4.3 Update session key phase In our scheme, this phase is same to the corresponding phase in Lee-Lai-Li s scheme, so we omit it here. 4.4 Password change phase Step 1 U i inserts his smart card and then inputs ID i, P W i and asks for changing password. Step 2 U i s smart card computes Ri = h(p Wi IDi ) and checks whether Ri = R i or not. If they are equal, U i chooses a new password P W new. Step 3 The smart card computes R new = h(p W new ID i ), BP W new = BP W h(p W i ID i ) h(p W new ID i ). And then it replaces R i and BP W with R new and BP W new respectively. 5 Security Analysis In this section, we will mainly consider the improved aspects in security of our proposed scheme. The other s security features are same to those of Lee-Lai-Li s scheme. 5.1 Resist offline dictionary attack The offline dictionary attack means that an attacker collects related information by various methods and then attempts to guess user U i s identity ID i or password P W i using these information. In our improved scheme, the values an adversary might collect are CID, CID new, R i, BP W, V i, Q i, N i,

7 C. Xu et al. /Journal of Computational Information Systems 9: 14 (2013) V j, Q j, N j and Q ij. Among them, the two values of R i and BP W might be obtained by extracting the information stored in U i s smart card which might be lost or stolen. Other seven values of V i, Q i, N i, V j, Q j, N j and Q ij can be collected by intercepting or eavesdropping the messages transmitted between U i and S j in insecure channels. Besides, the values CID and CID new can be obtained by both means above. According to assumption 3, the adversary can not successfully offline guess the identity ID i or password P W i from R i = h(p W i ID i ) and BP W = B i h(p W i ID i ) where the ID i and P W i come in pairs. The adversary also cannot get ID i from CID = h(id i b) since the random value is not stored and used only once. Besides, the dynamic identity CID is updated by the recursion CID new = h(cid b new ) in each login and verification phases. Therefore, it is hardly possible to guess ID i from CID or CID new. Finally, the adversary also can not guess ID i or P W i from other values of V i, Q i, N i, V j, Q j, N j and Q ij without the secret knowledge B i and B new. Based on analysis above, we can see the proposed scheme resist the offline dictionary attack. 5.2 Improvement of efficiency in wrong password detection and password change phase In our improved scheme, we design a mechanism in step 1 of the login phase that can be used to check validity of the inputted ID i and P W i in smart cards. Therefore, the wrong password will be quickly detected by the user U i s smart card when U i inputs a wrong password P W i by mistake. Consequently, the scheme s efficiency is improved. Compared with Lee-Lin-Chang s scheme, the Lee-Lai-Li s scheme improves the user-friendliness property of password change phase by avoiding to transmit many high secret values between U i and S j over a secure channel. However, the efficiency and conveniency are still not improved as described in subsection 3.3. In our proposed scheme, the password change phase only involves the corresponding user himself/herself without the help of S j or RC. No any message needs to be transmitted between U i and S j. As a result, the efficiency and conveniency of the proposed scheme are improved substantially. 5.3 Comparative analysis of computation overhead In Table 2, we conduct comparative analysis of computation overhead among four recently proposed scheme including our proposed scheme. Since the computation cost of exclusion-or and concatenation operations require very few computation resources, we neglect these types of computation overheads here. Besides, we denote T h as the time complexity for hash function. From Table 2, we can easily see our scheme and Lee-Lai-Li s scheme are both more efficient than other two related schemes. Even if compared with Lee-Lai-Li s scheme, the improved scheme requires only two more hash computations. One is processed in registration phase, the other is conducted in login phase. Of course, it is worth these two more hash operations to remedy those weaknesses of Lee-Lai-Li s scheme. 6 Conclusions In this paper, we show that Lee-Lai-Li s scheme suffers from offline dictionary attack, low efficiency in wrong password detection, low efficiency and inconveniency in password change phase. To

8 5520 C. Xu et al. /Journal of Computational Information Systems 9: 14 (2013) Table 2: Cost comparisons of our scheme and previously proposed schemes ours Lee-Lai-Li s scheme(2012) Lee-Lin-Chang s scheme(2011) Cost of user registration 4T h 3T h 6T h 6T h Cost of server registration 1T h 1T h 2T h 2T h Cost of login and authentication User 9T h 8T h 10T h 11T h Server 9T h 9T h 11T h 5T h RC 0T h 0T h 0T h 13T h Li et al. s scheme(2011) remedy these weaknesses, we proposed an improved scheme. Through comparative analysis, we prove that our proposed scheme is more secure and keeps low cost simultaneously. References [1] C. C. Lee, T. H. Lin, R. X. Chang. A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards[j]. Expert Systems with Applications, 2011, 38(11): [2] X. Li, Y. P. Xiong, J. Ma, W. D. Wang. An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards[j]. Journal of Network and Computer Applications, 2012, 35(2): [3] Y. P. Liao, S. S. Wang. A secure dynamic ID based remote user authentication scheme for multiserver environment[j]. Computer Standards & Interfaces, 2009, 31(1): [4] H. C. Hsiang, W. K. Shih. Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment[j]. Computer Standards & Interfaces, 2009, 31(6): [5] C. C. Lee, Y. M. Lai, and C. T. Li. An Improved Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment[J]. International Journal of Security and Its Application, 2012, 6(2): pp [6] S. K. Sood, A. K. Sarje, K. Singh. A secure dynamic identity based authentication protocol for multi-server architecture[j]. Journal of Network and Computer Applications, 2011, 34(2): [7] P. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis[C]. Proceeding of Advanced in Cryptology (CRYPTO 99) 2009, August 15-19, Santa Barbara, USA. [8] D. L. Guo, F. T. Wen. A More Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment[J], Journal of Computational Information Systems, 2013, 9(2):

Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement

Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement 1 Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement Sonam Devgan Kaul, Amit K. Awasthi School of Applied Sciences, Gautam Buddha University, Greater Noida, India sonamdevgan11@gmail.com,

More information

Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards

Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards Younghwa An Computer Media Information Engineering, Kangnam University, 111, Gugal-dong, Giheung-gu, Yongin-si,

More information

Remote User Authentication Scheme in Multi-server Environment using Smart Card

Remote User Authentication Scheme in Multi-server Environment using Smart Card Remote User Authentication Scheme in Multi-server Environment using Smart Card Jitendra Kumar Tyagi A.K. Srivastava Pratap Singh Patwal ABSTRACT In a single server environment, one server is responsible

More information

Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme

Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme Smart-card-loss-attack and Improvement of Hsiang et al. s Authentication Scheme Y.. Lee Department of Security Technology and Management WuFeng niversity, hiayi, 653, Taiwan yclee@wfu.edu.tw ABSTRAT Due

More information

An Enhanced Dynamic Identity Based Remote User Authentication Scheme Using Smart Card without a Verification Table

An Enhanced Dynamic Identity Based Remote User Authentication Scheme Using Smart Card without a Verification Table An Enhanced Dynamic Identity Based Remote User Authentication Scheme Using Smart Card without a Verification Table B. Sumitra, Research Scholar, Christ University, Bangalore, India (*Corresponding Author)

More information

Comments on four multi-server authentication protocols using smart card

Comments on four multi-server authentication protocols using smart card Comments on four multi-server authentication protocols using smart card * Jue-Sam Chou 1, Yalin Chen 2, Chun-Hui Huang 3, Yu-Siang Huang 4 1 Department of Information Management, Nanhua University Chiayi

More information

Security Improvements of Dynamic ID-based Remote User Authentication Scheme with Session Key Agreement

Security Improvements of Dynamic ID-based Remote User Authentication Scheme with Session Key Agreement Security Improvements of Dynamic ID-based Remote User Authentication Scheme with Session Key Agreement Young-Hwa An* * Division of Computer and Media Information Engineering, Kangnam University 111, Gugal-dong,

More information

Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment

Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment Archana P.S, Athira Mohanan M-Tech Student [Cyber Security], Sree Narayana Gurukulam College of Engineering Ernakulam,

More information

An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol

An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol International Journal of Network Security, Vol.14, No.1, PP.39 46, Jan. 2012 39 An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol Sandeep Kumar Sood Department of Computer

More information

Cryptanalysis of a Markov Chain Based User Authentication Scheme

Cryptanalysis of a Markov Chain Based User Authentication Scheme Cryptanalysis of a Markov Chain Based User Authentication Scheme Ruhul Amin, G.P. Biswas Indian School of Mines, Dhanbad Department of Computer Science & Engineering Email: amin ruhul@live.com, gpbiswas@gmail.com

More information

A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS

A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2012, Vol.41, No.1 A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS Bae-Ling Chen 1, Wen-Chung Kuo 2*, Lih-Chyau Wuu 3 1

More information

Secure and Efficient Smart Card Based Remote User Password Authentication Scheme

Secure and Efficient Smart Card Based Remote User Password Authentication Scheme International Journal of Network Security, Vol.18, No.4, PP.782-792, July 2016 782 Secure and Efficient Smart Card Based Remote User Password Authentication Scheme Jianghong Wei, Wenfen Liu and Xuexian

More information

Security Flaws of Cheng et al. s Biometric-based Remote User Authentication Scheme Using Quadratic Residues

Security Flaws of Cheng et al. s Biometric-based Remote User Authentication Scheme Using Quadratic Residues Contemporary Engineering Sciences, Vol. 7, 2014, no. 26, 1467-1473 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49118 Security Flaws of Cheng et al. s Biometric-based Remote User Authentication

More information

A robust smart card-based anonymous user authentication protocol for wireless communications

A robust smart card-based anonymous user authentication protocol for wireless communications University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2014 A robust smart card-based anonymous user authentication

More information

Expert Systems with Applications

Expert Systems with Applications Expert Systems with Applications 38 (2011) 13863 13870 Contents lists available at ScienceDirect Expert Systems with Applications journal homepage: www.elsevier.com/locate/eswa A secure dynamic ID based

More information

Cryptanalysis of An Advanced Temporal Credential- Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks

Cryptanalysis of An Advanced Temporal Credential- Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks Cryptanalysis of An Advanced Temporal Credential- Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks Chandra Sekhar Vorugunti 1, Mrudula Sarvabhatla 2 1 Dhirubhai

More information

On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme

On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme On the Security of Yoon and Yoo s Biometrics Remote User Authentication Scheme MING LIU * Department of Tourism Management WEN-GONG SHIEH Department of Information Management Chinese Culture University

More information

Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards

Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards Ding Wang, Chun-Guang Ma, Peng Wu To cite this version: Ding Wang, Chun-Guang Ma, Peng Wu. Secure Password-Based

More information

A Smart Card Based Authentication Protocol for Strong Passwords

A Smart Card Based Authentication Protocol for Strong Passwords A Smart Card Based Authentication Protocol for Strong Passwords Chin-Chen Chang 1,2 and Hao-Chuan Tsai 2 1 Department of Computer Science and Information Engineering, Feng Chia University, Taichung, Taiwan,

More information

An Efficient and Secure Multi-server Smart Card based Authentication Scheme

An Efficient and Secure Multi-server Smart Card based Authentication Scheme An Efficient Secure Multi-server Smart Card based Authentication Scheme Toshi Jain Department of r Science Engineering Oriental Institute of Science & Technology Bhopal, India Seep Pratap Singh Department

More information

ISSN X INFORMATION TECHNOLOGY AND CONTROL, 2011, Vol.40, No.3. ISSN X INFORMATION TECHNOLOGY AND CONTROL, 2011 Vol.?, No.?, 1?

ISSN X INFORMATION TECHNOLOGY AND CONTROL, 2011, Vol.40, No.3. ISSN X INFORMATION TECHNOLOGY AND CONTROL, 2011 Vol.?, No.?, 1? ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2011, Vol.40, No.3 ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2011 Vol.?, No.?, 1? A ROBUST A Robust REMOTE RemoteUSER User Authentication AUTHENTICATION

More information

Efficient password authenticated key agreement using bilinear pairings

Efficient password authenticated key agreement using bilinear pairings Mathematical and Computer Modelling ( ) www.elsevier.com/locate/mcm Efficient password authenticated key agreement using bilinear pairings Wen-Shenq Juang, Wei-Ken Nien Department of Information Management,

More information

Security Improvement of Two Dynamic ID-based Authentication Schemes by Sood-Sarje-Singh

Security Improvement of Two Dynamic ID-based Authentication Schemes by Sood-Sarje-Singh Security Improvement of Two Dynamic ID-based Authentication Schemes by Sood-Sarje-Singh R. Martínez-Peláez *1, F. Rico-Novella 2, J. Forné 2, P. Velarde-Alvarado 3 1 Institute of Informatics University

More information

The Modified Scheme is still vulnerable to. the parallel Session Attack

The Modified Scheme is still vulnerable to. the parallel Session Attack 1 The Modified Scheme is still vulnerable to the parallel Session Attack Manoj Kumar Department of Mathematics, Rashtriya Kishan (P.G.) College Shamli- Muzaffarnagar-247776 yamu_balyan@yahoo.co.in Abstract

More information

An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards

An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards Al-Sakib Khan Pathan and Choong Seon Hong Department of Computer Engineering, Kyung Hee University, Korea spathan@networking.khu.ac.kr

More information

A SMART CARD BASED AUTHENTICATION SCHEME FOR REMOTE USER LOGIN AND VERIFICATION. Received April 2011; revised September 2011

A SMART CARD BASED AUTHENTICATION SCHEME FOR REMOTE USER LOGIN AND VERIFICATION. Received April 2011; revised September 2011 International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 8, August 2012 pp. 5499 5511 A SMART CARD BASED AUTHENTICATION SCHEME FOR

More information

An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings

An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings Debasis Giri and P. D. Srivastava Department of Mathematics Indian Institute of Technology, Kharagpur 721 302, India

More information

A ROBUST AND FLEXIBLE BIOMETRICS REMOTE USER AUTHENTICATION SCHEME. Received September 2010; revised January 2011

A ROBUST AND FLEXIBLE BIOMETRICS REMOTE USER AUTHENTICATION SCHEME. Received September 2010; revised January 2011 International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 5(A), May 2012 pp. 3173 3188 A ROBUST AND FLEXIBLE BIOMETRICS REMOTE USER

More information

Secure Password-based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards

Secure Password-based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards Secure Password-based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards Ding Wang 1,2, Chun-guang Ma 1,, and Peng Wu 1 1 Harbin Engineering University, Harbin City 150001, China 2

More information

Research Article An Anonymous User Authentication with Key Agreement Scheme without Pairings for Multiserver Architecture Using SCPKs

Research Article An Anonymous User Authentication with Key Agreement Scheme without Pairings for Multiserver Architecture Using SCPKs The Scientific World Journal Volume 2013, Article ID 419592, 8 pages http://dx.doi.org/10.1155/2013/419592 Research Article An Anonymous User Authentication with Key Agreement Scheme without Pairings for

More information

A Noble Remote User Authentication Protocol Based on Smart Card Using Hash Function

A Noble Remote User Authentication Protocol Based on Smart Card Using Hash Function A Noble Remote User Authentication Protocol Based on Smart Card Using Hash Function Deepchand Ahirwal 1, Prof. Sandeep Raghuwanshi 2 1 Scholar M.Tech, Information Technology, Samrat Ashok Technological

More information

An efficient and practical solution to secure password-authenticated scheme using smart card

An efficient and practical solution to secure password-authenticated scheme using smart card An efficient and practical solution to secure password-authenticated scheme using smart card R. Deepa 1, R. Prabhu M.Tech 2, PG Research scholor 1, Head of the Department 2 Dept.of Information Technology,

More information

The Password Change Phase is Still Insecure

The Password Change Phase is Still Insecure Manoj Kumar: The password change phase change is still insecure 1 The Password Change Phase is Still Insecure Manoj Kumar!"#$ %&''%% E. Mail: yamu_balyan@yahoo.co.in Abstract In 2004, W. C. Ku and S. M.

More information

Comparative Analysis of Smart Card Authentication Schemes

Comparative Analysis of Smart Card Authentication Schemes IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. IV (Jan. 2014), PP 91-97 Comparative Analysis of Smart Card Authentication Schemes Toshi jain

More information

A Simple User Authentication Scheme for Grid Computing

A Simple User Authentication Scheme for Grid Computing A Simple User Authentication Scheme for Grid Computing Rongxing Lu, Zhenfu Cao, Zhenchuai Chai, Xiaohui Liang Department of Computer Science and Engineering, Shanghai Jiao Tong University 800 Dongchuan

More information

A strong password-based remote mutual authentication with key agreement scheme on elliptic curve cryptosystem for portable devices

A strong password-based remote mutual authentication with key agreement scheme on elliptic curve cryptosystem for portable devices Appl. Math. Inf. Sci. 6, No. 2, 217-222 (2012) 217 Applied Mathematics & Information Sciences An International Journal A strong password-based remote mutual authentication with key agreement scheme on

More information

Cryptanalysis on Efficient Two-factor User Authentication Scheme with Unlinkability for Wireless Sensor Networks

Cryptanalysis on Efficient Two-factor User Authentication Scheme with Unlinkability for Wireless Sensor Networks Cryptanalysis on Efficient Two-factor User Authentication Scheme with Unlinkability for Wireless Sensor Networks Hae-Won Choi 1, Hyunsung Kim 2,3, 1 Department of Computer Engineering, Kyungwoon University,

More information

A flexible biometrics remote user authentication scheme

A flexible biometrics remote user authentication scheme Computer Standards & Interfaces 27 (2004) 19 23 www.elsevier.com/locate/csi A flexible biometrics remote user authentication scheme Chu-Hsing Lin*, Yi-Yi Lai Department of Computer Science and Information

More information

An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks

An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks Ad Hoc & Sensor Wireless Networks, Vol. 10, pp. 361 371 Reprints available directly from the publisher Photocopying permitted by license only 2010 Old City Publishing, Inc. Published by license under the

More information

A New Secure Mutual Authentication Scheme with Smart Cards Using Bilinear Pairings

A New Secure Mutual Authentication Scheme with Smart Cards Using Bilinear Pairings International Journal of Mathematical Analysis Vol. 8, 2014, no. 43, 2101-2107 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijma.2014.48269 A New Secure Mutual Authentication Scheme with Smart

More information

A Hash-based Strong Password Authentication Protocol with User Anonymity

A Hash-based Strong Password Authentication Protocol with User Anonymity International Journal of Network Security, Vol.2, No.3, PP.205 209, May 2006 (http://isrc.nchu.edu.tw/ijns/) 205 A Hash-based Strong Password Authentication Protocol with User Anonymity Kumar Mangipudi

More information

A Simple User Authentication Scheme for Grid Computing

A Simple User Authentication Scheme for Grid Computing International Journal of Network Security, Vol.7, No.2, PP.202 206, Sept. 2008 202 A Simple User Authentication Scheme for Grid Computing Rongxing Lu, Zhenfu Cao, Zhenchuan Chai, and Xiaohui Liang (Corresponding

More information

Robust Two-factor Smart Card Authentication

Robust Two-factor Smart Card Authentication Robust Two-factor Smart Card Authentication Omer Mert Candan Sabanci University Istanbul, Turkey mcandan@sabanciuniv.edu Abstract Being very resilient devices, smart cards have been commonly used for two-factor

More information

A Multi-function Password Mutual Authentication Key Agreement Scheme with Privacy Preservingg

A Multi-function Password Mutual Authentication Key Agreement Scheme with Privacy Preservingg Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 2, April 2014 A Multi-function Password Mutual Authentication Key Agreement

More information

Robust EC-PAKA Protocol for Wireless Mobile Networks

Robust EC-PAKA Protocol for Wireless Mobile Networks International Journal of Mathematical Analysis Vol. 8, 2014, no. 51, 2531-2537 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijma.2014.410298 Robust EC-PAKA Protocol for Wireless Mobile Networks

More information

An Improvement on Remote User Authentication Schemes Using Smart Cards

An Improvement on Remote User Authentication Schemes Using Smart Cards Article An Improvement on Remote User Authentication Schemes Using Smart Cards Chin-Ling Chen 1,2, *, Yong-Yuan Deng 1, Yung-Wen Tang 3, Jung-Hsuan Chen 4 and Yu-Fan Lin 1 1 Department of Computer Science

More information

A secure and effective anonymous user authentication scheme for roaming service in global mobility networks

A secure and effective anonymous user authentication scheme for roaming service in global mobility networks University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2013 A secure and effective anonymous user authentication

More information

A weakness in Sun-Chen-Hwang s three-party key agreement protocols using passwords

A weakness in Sun-Chen-Hwang s three-party key agreement protocols using passwords A weakness in Sun-Chen-Hwang s three-party key agreement protocols using passwords Junghyun Nam Seungjoo Kim Dongho Won School of Information and Communication Engineering Sungkyunkwan University 300 Cheoncheon-dong

More information

A LITERATURE SURVEY ON NOVEL REMOTE AUTHENTICATION VIA VIDEO OBJECT AND BIOMETRICS

A LITERATURE SURVEY ON NOVEL REMOTE AUTHENTICATION VIA VIDEO OBJECT AND BIOMETRICS A LITERATURE SURVEY ON NOVEL REMOTE AUTHENTICATION VIA VIDEO OBJECT AND BIOMETRICS T.Sathya, T.Krishnan, 1 PG Student, SASURIE Academy Of Engineering, Coimbatore 2 Assistant Professor Sasurie Academy Of

More information

Efficient remote mutual authentication and key agreement

Efficient remote mutual authentication and key agreement computers & security 25 (2006) 72 77 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/cose Efficient remote mutual authentication and key agreement Wen-Gong Shieh*, Jian-Min

More information

Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks

Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks Sensors 2014, 14, 6443-6462; doi:10.3390/s140406443 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Security Analysis and Improvements of Two-Factor Mutual Authentication with Key

More information

Cryptanalysis and Improvement of a New. Ultra-lightweight RFID Authentication. Protocol with Permutation

Cryptanalysis and Improvement of a New. Ultra-lightweight RFID Authentication. Protocol with Permutation Applied Mathematical Sciences, Vol. 7, 2013, no. 69, 3433-3444 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.211587 Cryptanalysis and Improvement of a New Ultra-lightweight RFID Authentication

More information

Cryptanalysis of a timestamp-based password authentication scheme 1

Cryptanalysis of a timestamp-based password authentication scheme 1 Cryptanalysis of a timestamp-based password authentication scheme 1 Lizhen Yang a Kefei Chen a a Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200030, P.R.China

More information

Improved Remote User Authentication Scheme Preserving User Anonymity

Improved Remote User Authentication Scheme Preserving User Anonymity 62 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.3, March 28 Improved Remote User Authentication Scheme Preserving User Anonymity Mrs. C. Shoba Bindu, Dr P. Chandra Sekhar

More information

An Enhanced Remote User Authentication Scheme with Smart Card

An Enhanced Remote User Authentication Scheme with Smart Card An Enhanced Remote User Authentication Scheme with Smart Card Manoj Kumar Department of Mathematics R. K. College Shamli-Muzaffarnagar U.P.-India- 247776 E-mail: yamu balyan@yahoo.co.in Abstract In 2000,

More information

An Enhanced Remote User Authentication Scheme with Smart Card

An Enhanced Remote User Authentication Scheme with Smart Card International Journal of Network Security, Vol.10, No.3, PP.175 184, May 2010 175 An Enhanced Remote User Authentication Scheme with Smart Card Manoj Kumar Department of Mathematics, Rashtriya Kishan College

More information

Security Analysis of Shim s Authenticated Key Agreement Protocols from Pairings

Security Analysis of Shim s Authenticated Key Agreement Protocols from Pairings Security Analysis of Shim s Authenticated Key Agreement Protocols from Pairings Hung-Min Sun and Bin-san Hsieh Department of Computer Science, National sing Hua University, Hsinchu, aiwan, R.O.C. hmsun@cs.nthu.edu.tw

More information

Cryptanalysis on Four Two-Party Authentication Protocols

Cryptanalysis on Four Two-Party Authentication Protocols Cryptanalysis on Four Two-Party Authentication Protocols Yalin Chen Institute of Information Systems and Applications, NTHU, Tawain d949702@oz.nthu.edu.tw Jue-Sam Chou * Dept. of Information Management

More information

A Secure and Efficient One-time Password Authentication Scheme for WSN

A Secure and Efficient One-time Password Authentication Scheme for WSN International Journal of Network Security, Vol.19, No.2, PP.177-181, Mar. 2017 (DOI: 10.6633/IJNS.201703.19(2).02) 177 A Secure and Efficient One-time Password Authentication Scheme for WSN Chung-Huei

More information

On the security of a certificateless signature scheme in the standard model

On the security of a certificateless signature scheme in the standard model On the security of a certificateless signature scheme in the standard model Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang State Key Laboratory of Networking and Switch Technology, Beijing University

More information

On the Security of Stream Cipher CryptMT v3

On the Security of Stream Cipher CryptMT v3 On the Security of Stream Cipher CryptMT v3 Haina Zhang 1, and Xiaoyun Wang 1,2 1 Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan 250100,

More information

A Simple Password Authentication Scheme Based on Geometric Hashing Function

A Simple Password Authentication Scheme Based on Geometric Hashing Function International Journal of Network ecurity, Vol.16, No.3, PP.237-243, May 2014 237 A imple Password Authentication cheme Based on Geometric Hashing Function Xu Zhuang 1, Chin-Chen Chang 2,3, Zhi-Hui Wang

More information

arxiv: v3 [cs.cr] 4 Feb 2014

arxiv: v3 [cs.cr] 4 Feb 2014 A Study On ID-based Authentication Schemes for Telecare Medical Information System arxiv:1311.0151v3 [cs.cr] 4 Feb 2014 Dheerendra Mishra Department of Mathematics Indian Institute of Technology Kharagpur

More information

Analysis and enhancements of an efficient biometricbased remote user authentication scheme using smart cards

Analysis and enhancements of an efficient biometricbased remote user authentication scheme using smart cards Analysis and enhancements of an efficient biometricbased remote user authentication scheme using smart cards Sana Ibjaoun 1,2, Anas Abou El Kalam 1, Vincent Poirriez 2 1 University Cadi Ayyad, Marrakesh,

More information

Security Vulnerabilities of User Authentication Scheme Using Smart Card

Security Vulnerabilities of User Authentication Scheme Using Smart Card Security Vulnerabilities of User Authentication Scheme Using Smart Card Ravi Pippal, Jaidhar C.D., Shashikala Tapaswi To cite this version: Ravi Pippal, Jaidhar C.D., Shashikala Tapaswi. Security Vulnerabilities

More information

Secure Communication in Digital TV Broadcasting

Secure Communication in Digital TV Broadcasting IJN International Journal of omputer cience and Network ecurity, VOL.8 No.9, eptember 2008 ecure ommunication in Digital TV Broadcasting Hyo Kim Division of Digital Media, Ajou University, Korea ummary

More information

An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System

An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System sensors Article An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System Chun-Ta Li 1, Tsu-Yang Wu 2,3,, Chin-Ling Chen 4,5,, Cheng-Chi Lee 6,7

More information

Cryptanalysis of Two Password-Authenticated Key Exchange. Protocols between Clients with Different Passwords

Cryptanalysis of Two Password-Authenticated Key Exchange. Protocols between Clients with Different Passwords International Mathematical Forum, 2, 2007, no. 11, 525-532 Cryptanalysis of Two Password-Authenticated Key Exchange Protocols between Clients with Different Passwords Tianjie Cao and Yongping Zhang School

More information

Article An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks

Article An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks Article An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks Youngseok Chung 1,2, Seokjin Choi 1, Youngsook Lee 3, Namje Park

More information

Improved Attack on Full-round Grain-128

Improved Attack on Full-round Grain-128 Improved Attack on Full-round Grain-128 Ximing Fu 1, and Xiaoyun Wang 1,2,3,4, and Jiazhe Chen 5, and Marc Stevens 6, and Xiaoyang Dong 2 1 Department of Computer Science and Technology, Tsinghua University,

More information

Ubiquitous One-Time Password Service Using Generic Authentication Architecture

Ubiquitous One-Time Password Service Using Generic Authentication Architecture Ubiquitous One-Time Password Service Using Generic Authentication Architecture Chunhua Chen 1, Chris J. Mitchell 2, and Shaohua Tang 3 1,3 School of Computer Science and Engineering South China University

More information

Weaknesses of Temporal Credential-Based Mutual Authentication with a Multiple-Password Scheme for Wireless Sensor Networks

Weaknesses of Temporal Credential-Based Mutual Authentication with a Multiple-Password Scheme for Wireless Sensor Networks Weaknesses of Temporal Credential-Based Mutual Authentication with a Multiple-Password Scheme for Wireless Sensor Networks Younsung Choi Department of Cyber Security, Howon University, 64, 3-gil, Gunsan,

More information

arxiv: v1 [cs.cr] 9 Jan 2018

arxiv: v1 [cs.cr] 9 Jan 2018 An efficient and secure two-party key agreement protocol based on chaotic maps Nahid Yahyapoor a, Hamed Yaghoobian b, Manijeh Keshtgari b a Electrical Engineering, Khavaran Institute of Higher Education,

More information

Security of the Lin-Lai smart card based user authentication scheme

Security of the Lin-Lai smart card based user authentication scheme Security of the Lin-Lai smart card based user authentication scheme Chris J. Mitchell and Qiang Tang Technical Report RHUL MA 2005 1 27 January 2005 Royal Holloway University of London Department of Mathematics

More information

Three Party Authentication Scheme with Privacy in Telecare Medicine Information Systems

Three Party Authentication Scheme with Privacy in Telecare Medicine Information Systems Three Party Authentication Scheme with Privacy in Telecare Medicine Information Systems Hee Joo Park * * Department of Cyber Security, Kyungil University, Kyungsan, Kyungbuk 712-701, Korea. *Orcid ID:

More information

Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach

Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach Ding Wang 1,2, Ping Wang 2, Chun-guang Ma 3, and Zhong Chen 1 1 College of Electronics Engineering and Computer

More information

An Efficient Trust Model for Online Application using 2-Factor Authentication and Token Based Authentication

An Efficient Trust Model for Online Application using 2-Factor Authentication and Token Based Authentication An Efficient Trust Model for Online Application using 2-Factor Authentication and Token Based Authentication Varsha Jotwani 1, Dr. Amit Dutta 2 1 Research Scholar, AISECT University, Department of Computer

More information

CSC 474 Network Security. Authentication. Identification

CSC 474 Network Security. Authentication. Identification Computer Science CSC 474 Network Security Topic 6. Authentication CSC 474 Dr. Peng Ning 1 Authentication Authentication is the process of reliably verifying certain information. Examples User authentication

More information

Cryptanalysis on Two Certificateless Signature Schemes

Cryptanalysis on Two Certificateless Signature Schemes Int. J. of Computers, Communications & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. V (2010), No. 4, pp. 586-591 Cryptanalysis on Two Certificateless Signature Schemes F. Zhang, S. Li, S. Miao, Y. Mu,

More information

A Secure Simple Authenticated Key Exchange Algorithm based Authentication for Social Network

A Secure Simple Authenticated Key Exchange Algorithm based Authentication for Social Network Journal of Computer Science 7 (8): 1152-1156, 2011 ISSN 1549-3636 2011 Science Publications A Secure Simple Authenticated Key Exchange Algorithm based Authentication for Social Network 1 P. Venkateswari

More information

CIS 6930/4930 Computer and Network Security. Topic 6. Authentication

CIS 6930/4930 Computer and Network Security. Topic 6. Authentication CIS 6930/4930 Computer and Network Security Topic 6. Authentication 1 Authentication Authentication is the process of reliably verifying certain information. Examples User authentication Allow a user to

More information

Cryptanalysis of Some RFID Authentication Protocols

Cryptanalysis of Some RFID Authentication Protocols 20 JOURNAL OF COMMUNICATIONS, VOL. 3, NO. 7, DECEMBER 2008 Cryptanalysis of Some RFID Authentication Protocols Tianjie Cao, Peng Shen School of Computer, China University of Mining and Technology Sanhuannanlu,

More information

How to Break and Repair Leighton and Micali s Key Agreement Protocol

How to Break and Repair Leighton and Micali s Key Agreement Protocol How to Break and Repair Leighton and Micali s Key Agreement Protocol Yuliang Zheng Department of Computer Science, University of Wollongong Wollongong, NSW 2522, AUSTRALIA yuliang@cs.uow.edu.au Abstract.

More information

HOST Authentication Overview ECE 525

HOST Authentication Overview ECE 525 Authentication Overview Authentication refers to the process of verifying the identity of the communicating principals to one another Usually sub-divided into Entity authentication Authentication in real-time

More information

A Novel Smart-Card Based Authentication Scheme Using Proactive Secret Sharing

A Novel Smart-Card Based Authentication Scheme Using Proactive Secret Sharing A Novel Smart-Card Based Authentication Scheme Using Proactive Secret Sharing Yuesheng Zhu, Bojun Wang*, Cheng Cai Lab of Communication and Information Security, Institute of Big Data Technologies, Shenzhen

More information

Improvement of recently proposed Remote User Authentication Schemes

Improvement of recently proposed Remote User Authentication Schemes Improvement of recently proposed Remote User Authentication Schemes Guanfei Fang and Genxun Huang Science Institute of Information Engineering University, Zhengzhou, 450002, P.R.China feifgf@163.com Abstract

More information

A New Efficient Authenticated and Key Agreement Scheme for SIP Using Digital Signature Algorithm on Elliptic Curves

A New Efficient Authenticated and Key Agreement Scheme for SIP Using Digital Signature Algorithm on Elliptic Curves Paper A New Efficient Authenticated and Key Agreement Scheme for SIP Using Digital Signature Algorithm on Elliptic Curves, Agadir, Morocco Abstract Voice over Internet Protocol (VoIP) has been recently

More information

A new SIP authentication scheme by incorporation of elliptic curve cryptography with ticket server

A new SIP authentication scheme by incorporation of elliptic curve cryptography with ticket server A new SIP authentication scheme by incorporation of elliptic curve cryptography with ticket server 1 Farnad Ahangari, 2 Mahsa Hosseinpour Moghaddam, 3 Seyyed Amin Hosseini Seno Department of Computer Engineering

More information

arxiv: v1 [cs.cr] 31 Dec 2018

arxiv: v1 [cs.cr] 31 Dec 2018 Security analysis of a self-embedding fragile image watermark scheme Xinhui Gong, Feng Yu, Xiaohong Zhao, Shihong Wang School of Science, Beijing University of Posts and Telecommunications, Beijing 100876,

More information

Journal of Computer and System Sciences. Two-factor mutual authentication based on smart cards and passwords

Journal of Computer and System Sciences. Two-factor mutual authentication based on smart cards and passwords Journal of Computer and System Sciences 74 (2008) 1160 1172 Contents lists available at ScienceDirect Journal of Computer and System Sciences www.elsevier.com/locate/jcss Two-factor mutual authentication

More information

CIS 4360 Introduction to Computer Security Fall WITH ANSWERS in bold. First Midterm

CIS 4360 Introduction to Computer Security Fall WITH ANSWERS in bold. First Midterm CIS 4360 Introduction to Computer Security Fall 2010 WITH ANSWERS in bold Name:.................................... Number:............ First Midterm Instructions This is a closed-book examination. Maximum

More information

Vulnerabililty Analysis of Multi-Factor Authentication Protocols

Vulnerabililty Analysis of Multi-Factor Authentication Protocols UNF Digital Commons UNF Theses and Dissertations Student Scholarship 2016 Vulnerabililty Analysis of Multi-Factor Authentication Protocols Keith Garrett Suggested Citation Garrett, Keith, "Vulnerabililty

More information

International Journal of Electrical and Computer Engineering 4: Application of Neural Network in User Authentication for Smart Home System

International Journal of Electrical and Computer Engineering 4: Application of Neural Network in User Authentication for Smart Home System Application of Neural Network in User Authentication for Smart Home System A. Joseph, D.B.L. Bong, and D.A.A. Mat Abstract Security has been an important issue and concern in the smart home systems. Smart

More information

AIT 682: Network and Systems Security

AIT 682: Network and Systems Security AIT 682: Network and Systems Security Topic 6. Authentication Instructor: Dr. Kun Sun Authentication Authentication is the process of reliably verifying certain information. Examples User authentication

More information

Authentication. Identification. AIT 682: Network and Systems Security

Authentication. Identification. AIT 682: Network and Systems Security AIT 682: Network and Systems Security Topic 6. Authentication Instructor: Dr. Kun Sun Authentication Authentication is the process of reliably verifying certain information. Examples User authentication

More information

Group Oriented Identity-Based Deniable Authentication Protocol from the Bilinear Pairings

Group Oriented Identity-Based Deniable Authentication Protocol from the Bilinear Pairings International Journal of Network Security, Vol.5, No.3, PP.283 287, Nov. 2007 283 Group Oriented Identity-Based Deniable Authentication Protocol from the Bilinear Pairings Rongxing Lu and Zhenfu Cao (Corresponding

More information

A Novel Smart Card Authentication Scheme using Image Watermarking

A Novel Smart Card Authentication Scheme using Image Watermarking A Novel Smart Card Authentication Scheme using Image Watermarking Mr. Saurabh Garg ME CSE MPCT GWALIOR Prof. Pradeep Gupta HEAD CSE & IT GIIT GWALIOR Abstract One of the primary issues of information technology

More information

Side channel attack: Power Analysis. Chujiao Ma, Z. Jerry Shi CSE, University of Connecticut

Side channel attack: Power Analysis. Chujiao Ma, Z. Jerry Shi CSE, University of Connecticut Side channel attack: Power Analysis Chujiao Ma, Z. Jerry Shi CSE, University of Connecticut Conventional Cryptanalysis Conventional cryptanalysis considers crypto systems as mathematical objects Assumptions:

More information

An Improvement on the Self-Verification Authentication Mechanism for A Mobile Satellite Communication System

An Improvement on the Self-Verification Authentication Mechanism for A Mobile Satellite Communication System Appl. Math. Inf. Sci. 8, No. 1L, 97-106 (2014) 97 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/081l13 An Improvement on the Self-Verification Authentication

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 10, April 2014 Two Way User Authentication Using Biometric Based Scheme for Wireless Sensor Networks Srikanth S P (Assistant professor, CSE Department, MVJCE, Bangalore) Deepika S Haliyal (PG Student, CSE Department,

More information