An Improved Protocol for Password Authentication Using Smart Cards
نویسندگان
چکیده
In recent years, several password authentication schemes for remote login and verification have been widely implemented for systems that control and access to Internet applications. Therefore, how to assure the security protection of these related operations in computer networks has been extensively investigated by many engineers in these two decades. Recently, an advanced smart card based password authentication scheme is proposed by Song. He claimed that the proposed scheme performs secure operations and activities over the insecure network communications. However, Song’s scheme is still vulnerable to the off-line password guessing attack, and it is lack of perfect forward secrecy and system reparability. In this paper, we state the security weaknesses of Song’s scheme, and then propose an improvement of the password based authentication scheme which not only inherits the criteria of authentication scheme such as mutual authentication and session key agreement but also protects against the risk of various attacks over the insecure Internet environment. Furthermore, we analyze the security and performance aspects to prove that our proposed scheme is more secure, efficient and practical for applications of networks communications.
منابع مشابه
Security Weaknesses of Dynamic ID-based Remote User Authentication Protocol
Recently, with the appearance of smart cards, many user authentication protocols using smart card have been proposed to mitigate the vulnerabilities in user authentication process. In 2004, Das et al. proposed a ID-based user authentication protocol that is secure against ID-theft and replay attack using smart card. In 2009, Wang et al. showed that Das et al.’s protocol is not secure to randoml...
متن کاملA Secure Password-Authenticated Key Agreement Using Smart Cards
Smart card based password for authentication has become a common trend. Although smart card brings conveniences, it also increases the risk in the case of lost cards. In other words, when the smart card is possessed by an attacker, the attacker will possibly attempt to analyze the secret information within the smart card to deduce the authentication mechanism of the server and then forge user c...
متن کاملCryptanalysis of Song's advanced smart card based password authentication protocol
Song [8] proposed very recently a password-based authentication and key establishment protocol using smart cards which attempts to solve some weaknesses found in a previous scheme suggested by Xu, Zhu, and Feng [9]. In this paper, we present attacks on the improved protocol, showing that it fails to achieve the claimed security goals.
متن کاملSecure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards
It is a challenge for password authentication protocols using non-tamper resistant smart cards to achieve user anonymity, forward secrecy, immunity to various attacks and high performance at the same time. In DBSec’11, Li et al. showed that Kim and Chung’s passwordbased remote user authentication scheme is vulnerable to various attacks if the smart card is non-tamper resistant. Consequently, an...
متن کاملA PingPong One-Time-Password system in Java application
The several techniques using technology based on biometrics, passwords, certificates, and smart cards can be used for user authentication in the accessible network system. One of the most popular areas in OTP authentication protocol can be used for authenticating a user by a server. It increases security by using a new password for each authentication while the previous password scheme iterativ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012