Security enhancement for a dynamic ID-based remote user authentication scheme

被引:0
|
作者
Liao, IE [1 ]
Lee, CC [1 ]
Hwang, MS [1 ]
机构
[1] Natl Chung Hsing Univ, Dept Comp Sci, Taichung 402, Taiwan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a paper recently published in the IEEE Transaction on Consumer Electronics, Das, Saxena, and Gulati proposed a dynamic ID-based remote user authentication scheme using smart cards that allows the users to choose and change their passwords freely, and does not maintain any verifier table. It can protect against ID-theft, replaying, forgery, guessing, insider, and stolen verifier attacks. However this paper shows that Das, Saxena, and Gulati's scheme has some attacks. Therefore, we propose a slight modification to their scheme to improve their weaknesses. As a result, the improved scheme can enhance the security of Das, Saxena, and Gulati's scheme. In addition, the proposed scheme does not add many computational costs additionally. Compare with their scheme, our scheme is also efficient.
引用
收藏
页码:437 / 440
页数:4
相关论文
共 50 条
  • [11] Enhancing the Security of a 'More Efficient & Secure Dynamic ID-based Remote User Authentication Scheme'
    Khan, Muhammad Khurram
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 420 - 424
  • [12] Security weaknesses of dynamic ID-based remote user authentication protocol
    Lee, Hyoungseob
    Choi, Donghyun
    Lee, Yunho
    Won, Dongho
    Kim, Seungjoo
    World Academy of Science, Engineering and Technology, 2009, 59 : 190 - 193
  • [13] Security Improvements of Dynamic ID-based Remote User Authentication Scheme with Session Key Agreement
    An, Young-Hwa
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 1072 - 1076
  • [14] An improved dynamic ID-based remote user authentication with key agreement scheme
    Wen, Fengtong
    Li, Xuelei
    COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (02) : 381 - 387
  • [15] A more efficient and secure dynamic ID-based remote user authentication scheme
    Wang, Yan-yan
    Liu, Jia-yong
    Xiao, Feng-xia
    Dan, Jing
    COMPUTER COMMUNICATIONS, 2009, 32 (04) : 583 - 585
  • [16] An Improvement of Dynamic ID-Based Remote User Authentication Scheme with Smart Cards
    Gao, Zhengxian
    Tu, Yaqing
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 4562 - 4567
  • [17] Two-Factor Dynamic ID-Based Remote User Authentication Scheme
    Huang, Renjun
    Su, Fengfu
    Chen, Yangyi
    PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 373 - 377
  • [18] Cryptanalysis of a dynamic ID-based remote user authentication?with key agreement scheme
    Tang, Hong-bin
    Liu, Xin-song
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (12) : 1639 - 1644
  • [19] An Improved Dynamic ID-Based Remote User Authentication with Key Agreement Scheme
    Qu, Juan
    Zou, Li-Min
    JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2013, 2013
  • [20] Weaknesses of an efficient and secure dynamic ID-based remote user authentication scheme
    Martinez-Pelaez, Rafael
    Rico-Novella, Francisco
    2012 IBEROAMERICAN CONFERENCE ON ELECTRONICS ENGINEERING AND COMPUTER SCIENCE, 2012, 3 : 351 - 353