Cryptanalysis of a Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme

被引:0
|
作者
Quan, Chunyi [1 ]
Jung, Jaewook [1 ]
Lee, Hakjun [1 ]
Kang, Dongwoo [1 ]
Won, Dongho [2 ]
机构
[1] Sungkyunkwan Univ, Dept Elect & Comp Engn, Seoul, South Korea
[2] Sungkyunkwan Univ, Dept Comp Engn, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
authentication; chaotic chebyshev polynomials; cryptanalysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In modern internet environments, the remote authentication scheme ensures a secure communication between a user and a server, hence its importance is significantly increasing. Numerous chaotic map based authentication schemes have been proposed to enable communication parties share session keys in a more secure manner. Recently, Truong et al. applied Chebyshev polynomials to propose an enhanced key agreement protocol and claimed that their scheme achieves many security requirements and could withstand various attacks. However, in this paper, we demonstrate that the scheme by Truong et al. is vulnerable to stolen smart card attack, session key derived attack and denial of service attack. Besides, a malicious user can launch identity guessing attack and impersonate any legal users and establish communication with the server.
引用
收藏
页码:438 / 441
页数:4
相关论文
共 50 条
  • [21] Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card
    Ruhul Amin
    Tanmoy Maitra
    Debasis Giri
    P. D. Srivastava
    Wireless Personal Communications, 2017, 96 : 4629 - 4659
  • [22] Cryptanalysis of a fingerprint-based remote user authentication scheme using smart cards
    Hsieh, BT
    Yeh, HT
    Sun, HM
    Lin, CT
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 349 - 350
  • [23] Cryptanalysis of 'A Robust Smart-Card-Based Remote User Password Authentication Scheme'A
    Kumari, Saru
    Bin Muhaya, Fahad
    Khan, Muhammad Khurram
    Kumar, Rahul
    2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 247 - 250
  • [24] Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards
    Ku, WC
    Chang, ST
    Chiang, MH
    ELECTRONICS LETTERS, 2005, 41 (05) : 240 - 241
  • [25] Cryptanalysis and Improvement on a Remote User Authentication Scheme Using Bilinear Pairings
    Zhang, Lijiang
    Wei, Puwen
    ICHIT 2008: INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 257 - 261
  • [26] Cryptanalysis and Improvement on Remote User Mutual Authentication Scheme with Smart Cards
    Arshad, Razi
    Ikram, Nassar
    11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 1202 - 1206
  • [27] Cryptanalysis of a modified remote user authentication scheme using smart cards
    Leung, KC
    Cheng, LM
    Fong, AS
    Chan, CK
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2003, 49 (04) : 1243 - 1245
  • [28] Cryptanalysis and Improvement of Remote User Authentication Scheme Using Smart Card
    Madhusudhan, R.
    Hegde, Manjunath
    PROCEEDINGS OF 6TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE 2016), 2016, : 84 - 89
  • [29] Cryptanalysis and Improvement of a Remote User Authentication Scheme using Smart Cards
    Giri, Debasis
    Srivastava, P. D.
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 355 - 361
  • [30] Cryptanalysis of Kumar's Remote User Authentication Scheme with Smart Card
    Hwang, Min-Shiang
    Cahyadi, Eko Fajar
    Chou, Yuen-Cheng
    Yang, Cheng-Ying
    2018 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2018, : 416 - 420