skip to main content
article

Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment

Published: 01 November 2009 Publication History

Abstract

Recently, Liao and Wang proposed a secure dynamic ID based remote user authentication scheme for multi-server environment, and claimed that their scheme was intended to provide mutual authentication, two-factor security, replay attack, server spoofing attack, insider and stolen verifier attack, forward secrecy and user anonymity. In this paper, we show that Liao and Wang's scheme is still vulnerable to insider's attack, masquerade attack, server spoofing attack, registration center spoofing attack and is not reparable. Furthermore, it fails to provide mutual authentication. To remedy these flaws, this paper proposes an efficient improvement over Liao-Wang's scheme with more security. The computation cost, security, and efficiency of the improved scheme are well suited to the practical applications environment.

References

[1]
Hwang, T., Chen, Y. and Laih, C.S., Non-interactive password authentication without password tables. In: IEEE Region 10 Conference on Computer and Communication System, vol. 1. pp. 429-431.
[2]
Hwang, T. and Ku, W.C., Reparable key distribution protocols for Internet environments. IEEE Trans. Consum. Electron. v43 i5. 1947-1949.
[3]
Sun, H.M., An efficient remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. v46 i4. 958-961.
[4]
Shen, J.J., Lin, C.W. and Hwang, M.S., A modified remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. v49 i2. 414-416.
[5]
Awashti, Amit K. and Sunder, Lal, An enhanced remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. v50 i2. 583-586.
[6]
Chang, C. and Hwang, K.F., Some forgery attacks on a remote user authentication scheme using smart cards. Informatics. v14 i3. 289-294.
[7]
Das, M.L., Saxena, A. and Gulati, V.P., A dynamic ID-based remote user authentication scheme. IEEE Trans. Consum. Electron. v50 i2. 629-631.
[8]
Ku, W.C. and Chang, S.T., Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards. IEICE Trans. Commun. v5. 2165-2167.
[9]
Hwang, M.S., Lee, C.C. and Tang, Y.L., A simple remote user authentication scheme. Math. Comput. Model. v36 i1-2. 103-107.
[10]
Ku, W.C. and Chen, S.M., Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. v50 i1. 204-207.
[11]
Lee, C., Hwang, M.S. and Yang, W.P., A flexible remote user authentication scheme using smart cards. ACM Oper. Syst. Rev. v36 i3. 46-52.
[12]
Lee, W.B. and Chang, C.C., User identification and key distribution maintaining anonymity for distributed computer network. Comput. Syst. Sci. v15 i4. 211-214.
[13]
Tsuar, W.J., Wu, C.C. and Lee, W.B., . In: Networking-JCN2001LNCS, vol. 2093. Springer-Verlag. pp. 174-183.
[14]
Li, L., Lin, I. and Hwang, M., A remote password authentication scheme for multi-server architecture using neural networks. IEEE Trans. Neural Netw. v12 i6. 1498-1504.
[15]
Lin, C., Hwang, M.S. and Li, L.H., A new remote user authentication scheme for multi-server architecture. Future Gener. Comput. Syst. v1 i19. 13-22.
[16]
Tsuar, W.J., An enhanced user authentication scheme for multi-server internet services. Appl. Math. Comput. v170. 258-266.
[17]
Wu, T.S. and Hsu, C.L., Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks. Comput. Secur. v23. 120-125.
[18]
Yang, Y., Wang, S., Bao, F., Wang, J. and Deng, R., New efficient user identification and key distribution scheme providing enhanced security. Comput. Secur. v23 i8. 697-704.
[19]
Juang, W.S., Efficient multi-server password authenticated key agreement using smart cards. IEEE Trans. Consum. Electron. v50 i1. 251-255.
[20]
Chang, C. and Lee, J.S., An efficient and secure multi-server password authentication scheme using smart cards. In: IEEE. Proceeding of the International Conference on Cyberworlds,
[21]
Messergers, T.S., Dabbish, E.A. and Sloan, R.H., Examining smart card security under the threat of power analysis attacks. IEEE Trans. Comput. v51 i5. 541-552.
[22]
Liao, Y.P. and Wang, S.S., A secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces.
[23]
Wang, X., Guo, F., Lai, X. and Yu, H., . In: Collisions for Hash Functions MD4,MD5, HAVAL-128 and RIPEMD, Rump Session of Crypto'04 and IACR Eprint Archive,
[24]
Wang, X. and Yu, H.B., How to break MD5 and other hash functions. In: Advances in Cryptology Eurocrypt'05, Springer-Verlag. pp. 19-35.

Cited By

View all
  1. Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Computer Standards & Interfaces
      Computer Standards & Interfaces  Volume 31, Issue 6
      November, 2009
      148 pages

      Publisher

      Elsevier Science Publishers B. V.

      Netherlands

      Publication History

      Published: 01 November 2009

      Author Tags

      1. Authentication
      2. Dynamic ID
      3. Multi-server
      4. Mutual authentication
      5. Password
      6. Smart card

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 17 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media