skip to main content
article

Robust smart-card-based remote user password authenticationscheme

Published: 01 February 2014 Publication History

Abstract

Smart-card-based remote user password authentication schemes are commonly used for providing authorized users a secure method for remotely accessing resources over insecure networks. In 2009, Xu etal. proposed a smart-card-based password authentication scheme. They claimed their scheme can withstand attacks when the information stored on the smart card is disclosed. Recently, Sood etal. and Song discovered that the smart-card-based password authentication scheme of Xu etal. is vulnerable to impersonation and internal attacks. They then proposed their respective improved schemes. However, we found that there are still flaws in their schemes: the scheme of Sood etal. does not achieve mutual authentication and the secret key in the login phase of Song's scheme is permanent and thus vulnerable to stolen-smart-card and off-line guessing attacks. In this paper, we will propose an improved and efficient smart-card-based password authentication and key agreement scheme. According to our analysis, the proposed scheme not only maintains the original secret requirement but also achieves mutual authentication and withstands the stolen-smart-card attack. Copyright © 2012 John Wiley & Sons, Ltd.

References

[1]
Lamport L .Password authentication with insecure communication. Communications of the ACM 1987; Volume 24 Issue 11: pp.770-772.
[2]
Hwang MS, Li LH .A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 2000; Volume 46 Issue 1: pp.28-30.
[3]
Chen BL, Kuo WC, Wuu LC .A secure password-based remote user authentication scheme without smart cards. Information Technology and Control 2012; Volume 41 Issue 1: pp.53-59.
[4]
Chien HY, Jan JK, Tseng YM .An efficient and practical solution to remote authentication: Smart card. Computers & Security 2002; Volume 21 Issue 4: pp.372-375.
[5]
Das ML .Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 2009; Volume 8 Issue 3: pp.1086-1090.
[6]
Lee SW, Kim HS, Yoo KY .Improvement of Chien et al.'s remote user authentication scheme using smart cards. Computer Standards & Interfaces 2005; Volume 27 Issue 2: pp.181-183.
[7]
Lin CY, Hwang T .On 'a simple three-party password-based key exchange protocol'. IJCS: International Journal of Communication Systems 2011; Volume 24 Issue 11: pp.1520-1532.
[8]
Pippal RS, Jaidhar CD, Tapaswi S .Comments on symmetric key encryption based smart card authentication scheme. Proceedings of the Second International Conference on Computer Technology and Development ICCTD, Cairo, Egypt, 2-4 November 2010; pp.482-484.
[9]
Song R .Advanced smart card based password authentication protocol. Computer Standards & Interfaces 2010; Volume 32 Issue 5: pp.321-325.
[10]
Sood SK, Sarje AK, Singh K .An improvement of Xu et al.'s authentication scheme using smart cards. Proceedings of The Third Annual ACM Bangalore Conference, Bangalore, Karnataka, India, 2010; pp.1-5.
[11]
Xu J, Zhu WT, Feng DG .An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces 2009; Volume 31 Issue 4: pp.723-728.
[12]
Yang G, Wong DS, Wang H, Deng X .Two-factor mutual authentication based on smart cards and passwords. Journal of Computer and System Sciences 2008; Volume 74: pp.1160-1172.
[13]
Yeh KH, Lo NW, Li Y .Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture. IJCS:International Journal of Communication Systems 2011; Volume 24 Issue 7: pp.829-836.
[14]
Kocher P, Jaffe J, Jun B .Differential power analysis. Advances in Cryptology, CRYPTO'99 1999; Volume 1666: pp.788-797.
[15]
Messerges TS, Dabbish EA, Sloan RH .Examining smart card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; Volume 51 Issue 5: pp.541-552.
[16]
Forouzan BA .Introduction to Cryptography and Network Security. McGraw-Hill, Inc: New York, 2008.

Cited By

View all
  1. Robust smart-card-based remote user password authenticationscheme

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image International Journal of Communication Systems
      International Journal of Communication Systems  Volume 27, Issue 2
      February 2014
      202 pages
      ISSN:1074-5351
      EISSN:1099-1131
      Issue’s Table of Contents

      Publisher

      John Wiley and Sons Ltd.

      United Kingdom

      Publication History

      Published: 01 February 2014

      Author Tags

      1. internal attack
      2. mutual authentication
      3. session key agreement
      4. smart card
      5. stolen-smart-cardattack

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 17 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media