refused, because of the timestamp mechanism. Refer
to Eq. (13), since C
1
*
consists of A
i
*
and T, the
attacker must face the complexity of one-way hash
function. That is to say, assume that the attacker
replaces the conveyance time T with a false one, said
T
#
, in the interceptive information, and pass it to the
server. His conspiracy will be discovered, because
he can not produce the value C
1
#
corresponding to
T
#
. Therefore, the proposed method also can resist
the replay attack.
5.3 Impersonation Attack
The attacker has two major approaches to conduct
the Impersonation attack. Firstly, he can steal the
legal user’s smart card, and input the password of
guessing. According to Eq. (12), because we
increase the mechanism of password authentication,
whenever the attacker inputs wrong ID
i
*
, PW
i
*
and
R
*
values, he can't obtain the service of the smart
card. Secondly, the attacker makes use of old
messages to perform an intercept attack. Again,
according to Eq. (1) and Eq. (13), he will have to
resolve the difficult problem of one-way hash
function. Moreover, he has to steal the secret
information(x and G
*
) from the user and the server.
So, their attack will not succeed.
5.4 Guessing Password Attack
Similar to the above analysis, if the attacker wants to
utilize some interceptive information { ID
i
*
, C
1
*
, T}
to attack, then he must face the challenge of
breaking a double-hash function. In addition, based
on Eq. (10) and Eq. (12), if the attacker wants to
obtain the secret of G
*
, then he must face the
problem of solving a one-way hash function. Even if
the attacker gets the smart card, it is difficult to
guess the correct values of PW
i
and R by using the
dictionary attack, because value R is chosen at
random. So, the proposed method can resist the
guessing password attack.
5.5 Denial of Service Attack
We divide the denial of service attack into three
phases, and discuss them one by one. Consider the
login phase. Refer to Eq. (11), users can confirm the
legitimacy of the input information (ID
i
*
, PW
i
*
and
R
*
) and transfer the message of login by himself.
Then, consider the authentication phase. The server
can distinguish the legitimacy of login information
alone. Finally, consider the process of password
changes phase. Refer to Eq. (11), users also utilize
the smart card to verify the correctness of the input
information (ID
i
*
, PW
i
*
and the number R
*
), and
offer change service of register password. As can be
seen, all these phases require only local operations,
no message exchanges between the smart card and
the server are required, and thus it can resist the
denial of service attack.
6 CONCLUSION
In this paper, a remote user authentication scheme
using smart card base on one-way hash function was
proposed. This method provides an enhancement
protocol to Sun et al’s scheme, which has been
shown insecure. In their method, a privileged insider
can impersonate the lawful user to login remote
server. We not only resolve this security problem,
but also increase the verification efficiency of the
password.
ACKNOWLEDGEMENTS
This research was partially supported by the
National Science Council, Taiwan, R.O.C., under
grant NSC95-2220-E-218-002.
REFERENCES
Eun-Jun Yoon, Kee-Young Yoo, 2007. Comments on
Modified User Friendly Remote Authentication
Scheme with Smart Cards. IEICE TRANS. COMMUN.
Da-Zhi Su , Ji-Dong Zhong, Yu Sun, 2005. Weakness and
improvement on Wang–Li–Tie’s user-friendly remote
authentication scheme. Applied Mathematics and
Computation 170.
Narn-Yih Lee, Yu-Chung Chiu, 2005. Improved remote
authentication scheme with smart card. Computer
Standards & Interfaces.
Wei-Chi KU, Hsiu-Mei CHUANG, Maw-Jinn TSAUR,
2005. Vulnerabilities of Wu-Chieu’s Improved
Password Authentication Scheme Using Smart Cards.
IEICE TRANS. FUNDAMENTALS.
Min-Shiang Hwang, Jung-Wen Lo, Chi-Yu Liu, Shu-Chen
Lin, 2005. Cryptanalysis of a User Friendly Remote
Authentication Scheme with Smart Card, Journal of
Applied Sciences.
Kuo-Feng Hwang, I-En Liao, 2005. Two attacks on a user
friendly remote authentication scheme with smart
cards, ACM SIGOPS Operating Systems Review.
Chien-Lung Hsu, 2005. A user friendly remote
authentication scheme with smart cards against
SECRYPT 2007 - International Conference on Security and Cryptography
96