Cryptanalysis and Improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee's Scheme

被引:5
|
作者
Irshad, Azeem [1 ]
Naqvi, Husnain [1 ]
Chaudhry, Shehzad Ashraf [1 ]
Usman, Muhammad [2 ]
Shafiq, Muhammad [3 ]
Mir, Omid [4 ]
Kanwal, Ambrina [5 ]
机构
[1] Int Islamic Univ, Dept Comp Sci & Software Engn, Islamabad, Pakistan
[2] Quaid I Azam Univ, Fac Nat Sci, Dept Comp Sci, Islamabad, Pakistan
[3] Univ Gujrat, Dept Informat Technol, Gujrat, Pakistan
[4] Johannes Kepler Univ Linz, Inst Networks & Secur, Linz, Austria
[5] Bahria Univ, Dept Comp Sci, Islamabad, Pakistan
来源
INFORMATION TECHNOLOGY AND CONTROL | 2018年 / 47卷 / 03期
关键词
Multi-server authentication; cryptanalysis; biometrics; remote authentication; attack; REMOTE USER AUTHENTICATION; CHAOTIC-MAP; MUTUAL AUTHENTICATION; ET-AL; SECURE; EFFICIENT; ANONYMITY; IDENTITY; PROTOCOL; IDENTIFICATION;
D O I
10.5755/j01.itc.47.3.17361
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multi-server authentication makes convenient to benefit from services of various service providers on the basis of one-time registration through a trusted third party. Since, the users are reluctant to register themselves separately from all servers due to the hassle of remembering many passwords and other cost constraints. The multi-server authentication enables the immediate provision of services by the real-time verification of users on an insecure channel. The literature for multi-server oriented authenticated key agreement could be traced back to Li et al. and Lee et al., in 2000. Since then, numerous multi-server authentication techniques have been put forth. Nonetheless, the research academia looks for more secure and efficient authentication protocols. Recently, Chen and Lee's scheme presented a two-factor multi-server key agreement protocol, which is found to be prone to impersonation, stolen smart card, key-compromise impersonation attack, and trace attacks. Besides, the scheme is also found to have the inefficient password modification procedure. We propose an improved protocol that counters the above limitations in almost an equivalent computation cost. Moreover, our protocol is supplemented with formal security analysis using BAN logic along with performance analysis and evaluation.
引用
收藏
页码:431 / 446
页数:16
相关论文
共 50 条
  • [31] Improvement on a Biometric-Based Key Agreement and Authentication Scheme for the Multi-server Environments
    Moon, Jongho
    Lee, Youngsook
    Yang, Hyungkyu
    Lee, Hakjun
    Ha, Sewan
    Won, Dongho
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2018, PT I, 2018, 10960 : 541 - 557
  • [32] An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation
    ul Haq, Inam
    Wang, Jian
    Zhu, Youwen
    Maqbool, Saad
    DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (01) : 140 - 150
  • [33] An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation
    Inam ul haq
    Jian Wang
    Youwen Zhu
    Saad Maqbool
    Digital Communications and Networks, 2021, 7 (01) : 140 - 150
  • [34] Efficient multi-server password authenticated key agreement using smart cards
    Juang, WS
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (01) : 251 - 255
  • [35] An efficient and secure multi-server authentication scheme with key agreement
    Tsaur, Woei-Jiunn
    Li, Jia-Hong
    Lee, Wei-Bin
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (04) : 876 - 882
  • [36] Cryptanalysis of Lee et al.'s authenticated group key agreement
    Yuan, Wei
    Hu, Liang
    Li, Hongtu
    Chu, Jianfeng
    CEIS 2011, 2011, 15
  • [37] A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme
    Azeem Irshad
    Muhammad Sher
    Omer Nawaz
    Shehzad Ashraf Chaudhry
    Imran Khan
    Saru Kumari
    Multimedia Tools and Applications, 2017, 76 : 16463 - 16489
  • [38] A Privacy-Preserving Authenticated Key Agreement Scheme Based on Physically Unclonable Functions for Multi-Server Architecture
    Lee, Tian-Fu
    Chang, I-Pin
    Huang, Wei-Jie
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (06) : 3065 - 3077
  • [39] A privacy-preserving multi-server authenticated key-agreement scheme based on Chebyshev chaotic maps
    Tan, Zuowen
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1384 - 1397
  • [40] A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme
    Irshad, Azeem
    Sher, Muhammad
    Nawaz, Omer
    Chaudhry, Shehzad Ashraf
    Khan, Imran
    Kumari, Saru
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (15) : 16463 - 16489