Cryptanalysis and Improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee's Scheme

被引:5
|
作者
Irshad, Azeem [1 ]
Naqvi, Husnain [1 ]
Chaudhry, Shehzad Ashraf [1 ]
Usman, Muhammad [2 ]
Shafiq, Muhammad [3 ]
Mir, Omid [4 ]
Kanwal, Ambrina [5 ]
机构
[1] Int Islamic Univ, Dept Comp Sci & Software Engn, Islamabad, Pakistan
[2] Quaid I Azam Univ, Fac Nat Sci, Dept Comp Sci, Islamabad, Pakistan
[3] Univ Gujrat, Dept Informat Technol, Gujrat, Pakistan
[4] Johannes Kepler Univ Linz, Inst Networks & Secur, Linz, Austria
[5] Bahria Univ, Dept Comp Sci, Islamabad, Pakistan
来源
INFORMATION TECHNOLOGY AND CONTROL | 2018年 / 47卷 / 03期
关键词
Multi-server authentication; cryptanalysis; biometrics; remote authentication; attack; REMOTE USER AUTHENTICATION; CHAOTIC-MAP; MUTUAL AUTHENTICATION; ET-AL; SECURE; EFFICIENT; ANONYMITY; IDENTITY; PROTOCOL; IDENTIFICATION;
D O I
10.5755/j01.itc.47.3.17361
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multi-server authentication makes convenient to benefit from services of various service providers on the basis of one-time registration through a trusted third party. Since, the users are reluctant to register themselves separately from all servers due to the hassle of remembering many passwords and other cost constraints. The multi-server authentication enables the immediate provision of services by the real-time verification of users on an insecure channel. The literature for multi-server oriented authenticated key agreement could be traced back to Li et al. and Lee et al., in 2000. Since then, numerous multi-server authentication techniques have been put forth. Nonetheless, the research academia looks for more secure and efficient authentication protocols. Recently, Chen and Lee's scheme presented a two-factor multi-server key agreement protocol, which is found to be prone to impersonation, stolen smart card, key-compromise impersonation attack, and trace attacks. Besides, the scheme is also found to have the inefficient password modification procedure. We propose an improved protocol that counters the above limitations in almost an equivalent computation cost. Moreover, our protocol is supplemented with formal security analysis using BAN logic along with performance analysis and evaluation.
引用
收藏
页码:431 / 446
页数:16
相关论文
共 50 条
  • [41] An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics
    Chuang, Ming-Chin
    Chen, Meng Chang
    EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (04) : 1411 - 1418
  • [42] An improvement on authenticated key agreement scheme
    Chang, Chin-Chen
    Lin, Shih-Yi
    2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 3 - +
  • [43] An improved and secure chaotic map based authenticated key agreement in multi-server architecture
    Azeem Irshad
    Muhammad Sher
    Shehzad Ashraf Chaudhry
    Qi Xie
    Saru Kumari
    Fan Wu
    Multimedia Tools and Applications, 2018, 77 : 1167 - 1204
  • [44] An improved and secure chaotic map based authenticated key agreement in multi-server architecture
    Irshad, Azeem
    Sher, Muhammad
    Chaudhry, Shehzad Ashraf
    Xie, Qi
    Kumari, Saru
    Wu, Fan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (01) : 1167 - 1204
  • [45] Cryptanalysis and Improvement of a Robust Smart Card Authentication Scheme for Multi-server Architecture
    Wei, Jianghong
    Liu, Wenfen
    Hu, Xuexian
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (03) : 2255 - 2269
  • [46] An Untraceable Biometric-Based Multi-server Authenticated Key Agreement Protocol with Revocation
    Chang, Chin-Chen
    Ngoc-Tu Nguyen
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (04) : 1695 - 1715
  • [47] An Untraceable Biometric-Based Multi-server Authenticated Key Agreement Protocol with Revocation
    Chang C.-C.
    Nguyen N.-T.
    Wireless Personal Communications, 2016, 90 (4) : 1695 - 1715
  • [48] Cryptanalysis and Improvement of a Robust Smart Card Authentication Scheme for Multi-server Architecture
    Jianghong Wei
    Wenfen Liu
    Xuexian Hu
    Wireless Personal Communications, 2014, 77 : 2255 - 2269
  • [49] Cryptanalysis and improvement of a biometric-based authentication scheme for multi-server architecture
    Wan, Tao
    Liu, Xiaochang
    Liao, Weichuan
    Jiang, Nan
    International Journal of Network Security, 2020, 22 (03) : 492 - 503
  • [50] An Adaptive Secure Handover Authenticated Key Agreement for Multi-Server Architecture Communication Applications
    Wang, Wenming
    Huang, Haiping
    Xiao, Fu
    Li, Qi
    Xue, Lingyan
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (09) : 9830 - 9839