Further Improved Remote User Authentication Scheme
نویسندگان
چکیده
Kim and Chung previously proposed a password-based user authentication scheme to improve Yoon and Yoo’s scheme. However, Kim and Chung’s scheme is still vulnerable to an offline password guessing attack, an unlimited online password guessing attack, and server impersonation. We illustrate how their scheme can be compromised and then propose an improved scheme to overcome the weaknesses. Our improvement is based on the Rabin cryptosystem. We verify the correctness of our proposed scheme using the BAN logic. key words: network-level security and protection, authentication, security, password
منابع مشابه
An Improved Remote User Authentication Scheme Using Smart Cards
In 2000, Hwang and Li proposed a new remote user authentication scheme using smart cards. In the same year, Chan and Cheng pointed out that Hwang and Li’s scheme is not secure against the masquerade attack. Further, in 2003, Shen, Lin and Hwang pointed out a different type of attack on Hwang and Li’s scheme and presented a modified scheme to remove its security pitfalls. This paper presents an ...
متن کاملImproved Efficient Remote User Authentication Schemes
Recently, Yoon et al. proposed a new smart card based remote user authentication scheme. We show that this scheme is subject to forgery attacks if the information stored in the smart card is stolen. This violates the “twofactor security” objective of the smart card based remote user authentication schemes. We propose an amendment to this problem. We further propose two new schemes which are mor...
متن کاملCryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards
Recently, Li et al. proposed a secure biometric-based remote user authentication scheme using smart cards to withstand the security flaws of Li-Hwang’s efficient biometric-based remote user authentication scheme using smart cards. Li et al.’s scheme is based on biometrics verification, smart card and one-way hash function, and it also uses the random nonce rather than a synchronized clock, and ...
متن کاملAnalysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
The author first reviews the recently proposed Li-Hwang’s biometric-based remote user authentication scheme using smart cards; then shows that the Li-Hwang’s scheme has some design flaws in their scheme. In order to withstand those flaws in their scheme, an improvement of their scheme is further proposed. The author also shows that the improved scheme provides strong authentication with the use...
متن کاملAn Improvement of Efficient Dynamic ID-based User Authentication Scheme using Smart Cards without Verifier Tables
Remote user authentication scheme is one of the most convenient authentication schemes to deal with secret data over insecure channel. During the last couple of decades, many researchers have proposed a remote user authentication schemes which are ID-based, password-based, and smart card-based. Above all, smart card-based authentication schemes are becoming day by day more popular. One of the b...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEICE Transactions
دوره 94-A شماره
صفحات -
تاریخ انتشار 2011