SECURITY ENHANCEMENT FOR A LOW COMPUTATION COST USER AUTHENTICATION SCHEME

Behnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili

Abstract

In 2003, Wu and Chieu proposed a user friendly remote authentication scheme using smart cards. Later, Yang and Wang pointed out that Wu and Chieu’s scheme is vulnerable to the password guessing and forgery attacks. Recently, Lee et al. proposed an improved authentication scheme and claimed that their scheme is secure against forgery attack. However, in this paper, we illustrate that Lee et al.’s scheme is still vulnerable to the forgery attack. We also propose an enhancement of the scheme to resist such that attack.

References

  1. Lin, C-L. and Hwang, T. (2003). A password authentication scheme with secure password updating. Computers and Security, Vol. 22, Issue 1, pp. 68-72.
  2. Lamport, L. (1981). Password authentication with insecure communication. Communications of ACM, Vol. 24, pp. 770-772.
  3. Hwang, M-S. and Li, L-H. (2000). A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, Vol. 46, Issue 1, pp. 28-30.
  4. Sun, H-M. (2000). An efficient remote use authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, Vol. 46, Issue 4, pp. 958-961.
  5. Wu, S-T. and Chieu, B-C. (2003). A user friendly remote authentication scheme with smart cards. Computers and Security, Vol. 22, Issue 6, pp. 547-550.
  6. Fan, C-I. and Chan, Y-C. and Zhang, Z-K. (2005). Robust remote authentication scheme with smart cards. Computers and Security, Vol. 24, Issue 8, pp. 619-628.
  7. Yang, C-C. and Wang, R-C. (2004). Cryptanalysis of a user friendly remote authentication scheme with smart cards. Computers and Security, Vol. 23, Issue 5, pp. 425-427.
  8. Hwang, M-S. and Lo, J-W. and Liu, C-Y. and Lin, S-C. (2005). Cryptanalysis of a user friendly remote authentication scheme with smart card. Journal of Applied Sciences, Vol. 5, Issue 1, pp. 99-100.
  9. Hwang, K-F. and Liao, I-E. (2005). Two attacks on a user friendly remote authentication scheme with smart cards. ACM SIGOPS Operating Systems Review, Vol. 39, Issue 2, pp. 94-96.
  10. Lee, C-Y. and Lin, C-H. and Chang, C-C. (2005). An improved low computation cost user authentication scheme for mobile communication. Proceedings of 19th International Conference on Advanced Information Networking and Applications (AINA'05), IEEE Computer Society, Vol. 2, pp. 249-252.
Download


Paper Citation


in Harvard Style

Sattarzadeh B., Asadpour M. and Jalili R. (2006). SECURITY ENHANCEMENT FOR A LOW COMPUTATION COST USER AUTHENTICATION SCHEME . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006) ISBN 978-972-8865-63-4, pages 5-8. DOI: 10.5220/0002099900050008


in Bibtex Style

@conference{secrypt06,
author={Behnam Sattarzadeh and Mahdi Asadpour and Rasool Jalili},
title={SECURITY ENHANCEMENT FOR A LOW COMPUTATION COST USER AUTHENTICATION SCHEME},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)},
year={2006},
pages={5-8},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002099900050008},
isbn={978-972-8865-63-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)
TI - SECURITY ENHANCEMENT FOR A LOW COMPUTATION COST USER AUTHENTICATION SCHEME
SN - 978-972-8865-63-4
AU - Sattarzadeh B.
AU - Asadpour M.
AU - Jalili R.
PY - 2006
SP - 5
EP - 8
DO - 10.5220/0002099900050008