Cryptanalysis of a Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme

被引:0
|
作者
Quan, Chunyi [1 ]
Jung, Jaewook [1 ]
Lee, Hakjun [1 ]
Kang, Dongwoo [1 ]
Won, Dongho [2 ]
机构
[1] Sungkyunkwan Univ, Dept Elect & Comp Engn, Seoul, South Korea
[2] Sungkyunkwan Univ, Dept Comp Engn, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
authentication; chaotic chebyshev polynomials; cryptanalysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In modern internet environments, the remote authentication scheme ensures a secure communication between a user and a server, hence its importance is significantly increasing. Numerous chaotic map based authentication schemes have been proposed to enable communication parties share session keys in a more secure manner. Recently, Truong et al. applied Chebyshev polynomials to propose an enhanced key agreement protocol and claimed that their scheme achieves many security requirements and could withstand various attacks. However, in this paper, we demonstrate that the scheme by Truong et al. is vulnerable to stolen smart card attack, session key derived attack and denial of service attack. Besides, a malicious user can launch identity guessing attack and impersonate any legal users and establish communication with the server.
引用
收藏
页码:438 / 441
页数:4
相关论文
共 50 条
  • [1] Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment
    Toan-Thinh Truong
    Minh-Triet Tran
    Anh-Duc Duong
    Echizen, Isao
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 479 - 494
  • [2] Cryptanalysis of a remote user authentication scheme
    Wang, Bangju
    Zhang, Huanguo
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1699 - 1701
  • [3] Cryptanalysis and improvement of a remote user authentication scheme
    Ou Qingyu
    Huang Kai
    Li Guang
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL IV, PROCEEDINGS, 2009, : 49 - +
  • [4] Cryptanalysis of "An Improved Timestamp-Based Remote User Authentication Scheme"
    Kumari, Saru
    Gupta, Mridul K.
    Khan, Muhammad Khurram
    Bin Muhaya, Fahad T.
    2012 INTERNATIONAL CONFERENCE ON QUALITY, RELIABILITY, RISK, MAINTENANCE, AND SAFETY ENGINEERING (ICQR2MSE), 2012, : 1439 - 1442
  • [5] Cryptanalysis of Remote User Authentication Scheme with key agreement
    Madhusudan, R.
    Valiveti, Annapurna
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2015,
  • [6] Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps
    Zhao, Yan
    Li, Shiming
    Jiang, Liehui
    Liu, Tieming
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04):
  • [7] Cryptanalysis on Improved Remote User Authentication Scheme Preserving User Anonymity
    Lee, Sung-Woon
    Kwon, Hyuck-Jin
    Kim, Hyun-Sung
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (10): : 21 - 24
  • [8] Cryptanalysis and improvement of an enhanced smart card based remote user authentication scheme
    Xu, C. (cbqysy@gmail.com), 1600, Binary Information Press (10):
  • [9] CRYPTANALYSIS AND ENHANCEMENT OF MULTI FACTOR REMOTE USER AUTHENTICATION SCHEME BASED ON SIGNCRYPTION
    Rajasekar, Vani
    Jayapaul, Premalatha
    Krishnamoorthi, Sathya
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2020,
  • [10] Cryptanalysis of a remote user authentication scheme using smart cards
    Huang Kai
    Ou Qingyu
    Wu Xiaoping
    Song Yexin
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4490 - 4493