ON THE IMPROVEMENT OF REMOTE AUTHENTICATION SCHEME WITH SMART CARDS

Lih-Yang Wang, Chao-Chih Chen

2007

Abstract

In 2005, Sun et al’s proposed a user-friendly remote authentication scheme. In order to improve the efficiency of the authentication process, their method is based on one-way hash function. Unlike previous methods, Sun’s method allows the user to choose and change the password locally without connecting to the server. It can resist replay attack, impersonation attack, guessing password attack, denial of service attack. However, in this paper we will point out that their scheme is vulnerable to privileged insider attack, and an enhanced scheme is proposed to eliminate the weakness.

References

  1. Eun-Jun Yoon, Kee-Young Yoo, 2007. Comments on Modified User Friendly Remote Authentication Scheme with Smart Cards. IEICE TRANS. COMMUN.
  2. Da-Zhi Su , Ji-Dong Zhong, Yu Sun, 2005. Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication scheme. Applied Mathematics and Computation 170.
  3. Narn-Yih Lee, Yu-Chung Chiu, 2005. Improved remote authentication scheme with smart card. Computer Standards & Interfaces.
  4. Wei-Chi KU, Hsiu-Mei CHUANG, Maw-Jinn TSAUR, 2005. Vulnerabilities of Wu-Chieu's Improved Password Authentication Scheme Using Smart Cards. IEICE TRANS. FUNDAMENTALS.
  5. Min-Shiang Hwang, Jung-Wen Lo, Chi-Yu Liu, Shu-Chen Lin, 2005. Cryptanalysis of a User Friendly Remote Authentication Scheme with Smart Card, Journal of Applied Sciences.
  6. Kuo-Feng Hwang, I-En Liao, 2005. Two attacks on a user friendly remote authentication scheme with smart cards, ACM SIGOPS Operating Systems Review.
  7. Chien-Lung Hsu, 2005. A user friendly remote authentication scheme with smart cards against impersonation attacks, Applied Mathematics and Computation.
  8. Yingjie Wang, J.H. Li, L. Tie, 2005. Security analysis and improvement of a user-friendly remote authentication protocol, Applied Mathematics and Computation.
  9. Shyi-Tsong Wu, Bin-Chang Chieu, 2004. A note on a user friendly remote authentication scheme with smart cards. IEICE Trans. Fundamentals.
  10. Chou-Chen Yang, Ren-Chiun Wang, 2004. Cryptanalysis of a user friendly remote authentication scheme with smart, Computers & Security.
  11. Shyi-Tsong Wu, Bin-Chang Chieu, 2003. A User Friendly Remote Authentication Scheme with Smart Cards. Computer and Security.
  12. Hung-Min Sun. 2000. An efficient remote use authentication scheme using smart cards. IEEE Transactions on Consumer Electronics.
Download


Paper Citation


in Harvard Style

Wang L. and Chen C. (2007). ON THE IMPROVEMENT OF REMOTE AUTHENTICATION SCHEME WITH SMART CARDS . In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 93-97. DOI: 10.5220/0002124900930097


in Bibtex Style

@conference{secrypt07,
author={Lih-Yang Wang and Chao-Chih Chen},
title={ON THE IMPROVEMENT OF REMOTE AUTHENTICATION SCHEME WITH SMART CARDS},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={93-97},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002124900930097},
isbn={978-989-8111-12-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - ON THE IMPROVEMENT OF REMOTE AUTHENTICATION SCHEME WITH SMART CARDS
SN - 978-989-8111-12-8
AU - Wang L.
AU - Chen C.
PY - 2007
SP - 93
EP - 97
DO - 10.5220/0002124900930097