Cryptanalysis of Design and Analysis of a Provably Secure Multi-server Authentication Scheme
نویسندگان
چکیده
The rapid growth of inter-networking and communication technologies resulted in an exponential hit rate on commercial service providing websites (servers) like Google, Amazon, Flipkart etc. from remote users connected via Internet. To handle the networking load, the organizations are moving from the traditional two tier client server architecture to multi-server architecture for efficient load balancing. The traditional two-party authentication protocol for remote user authentication are not sufficient to break the ever increasing attacks on open network i.e. Internet. Also, the existing two-party authentication protocols are meant for single server, adopting these protocols for multi-server environment results in the requirement of huge computation cost for separate registration of user at each server. So, researchers started proposing authentication schemes specific to multi-server environment. In 2014, Yeh et al. proposed an improved version over Pippal et al.’s scheme which eliminates all identified weaknesses like susceptible to user impersonation attack, server counterfeit attack, and the man-in-the-middle attack. In 2015, Mishra et al. demonstrated that Yeh et al. scheme is susceptible to off-line password guessing attack, insider attack and user impersonation attack and proposed an improved version. In this manuscript we do a thorough analysis on Mishra et al. scheme and determine that Mishra et al. scheme is liable to ’known session specific temporary information’ attack and based on that, the attacker can realize all key attacks. We also demonstrate that Mishra et al. scheme consists of major inconsistencies like ’inefficient login phase’ which restrict the protocol to adopt to real time implementation.
منابع مشابه
Artemia: a family of provably secure authenticated encryption schemes
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...
متن کاملComputationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملCryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment
Multi-server authentication is going to be an integral part of remote authentication with the passage of time. The remote authentication has been part and parcel of internet based communication. In the last decade several multi-server authentication techniques has been presented. However there is still a need of more efficient and robust techniques. Lately, Saraswathi et al., presented a multi-...
متن کاملCryptanalysis of a Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
Recently, Chien et al. proposed a gateway-oriented password-based authenticated key exchange (GPAKE) protocol, through which a client and a gateway could generate a session key for future communication with the help of an authentication server. They also demonstrated that their scheme is provably secure in a formal model. However, in this letter, we will show that Chien et al.’s protocol is vul...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 20 شماره
صفحات -
تاریخ انتشار 2018