An Improvement of Sood, et al. 's Authentication Scheme using Smart Card

被引:0
|
作者
Shin, Kwang Cheul [1 ]
Cho, Jung Gil [2 ]
机构
[1] Sungkyul Univ, Div Ind Management Engn, Anyang, Gyeonggi Do 430742, South Korea
[2] Sungkyul Univ, Div Comp Sci Engn, 147-2,Anyang 8 Dong, Anyang, Gyeonggi Do 430742, South Korea
关键词
Authentication; Smart Card; Forgery Attack; Anonymity;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 2004, Das, et al.'s proposed the dynamic ID-based remote user authentication scheme to protect the user's anonymity. However, in 2005, Chein, et al.'s and Liao, et al.'s demonstrated that Das, et al.'s scheme failed to protecting user's anonymity. In addition, they showed that it was susceptible to guessing attack, so that it might expose the password to the remote system. In 2006, Liou, et al.'s proposed a new scheme which aimed to resolve the security vulnerabilities of Das, et al's scheme such as mutual authentication and malicious server attacks. However, in 2010, Sood, et al.'s demonstrated that Liou, et al's scheme is susceptible to impersonal attack, malicious user attack, man in the middle attack and offline password guessing attack. To resolve those vulnerabilities, Sood, et al.'s proposed new scheme. However, as a result of analysis of the new scheme proposed by Sood, et al., it is still vulnerable to malicious legal user attack and various attacks such as forgery, insider and database. In this paper, we propose an improvement to the Sood, et al.'s scheme in order to resolve such problems.
引用
收藏
页码:271 / 281
页数:11
相关论文
共 50 条
  • [21] Cryptanalysis and improvement of an 'improved remote authentication scheme with smart card'
    Holbl, Marko
    Welzer, Tatjana
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1301 - 1305
  • [22] A Comparative Analysis and Improvement of Smart Card based Authentication Scheme
    Panwar, Narendra
    Rauthan, Manmohan Singh
    Agarwal, Amit
    2016 NINTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2016, : 345 - 348
  • [23] Further analysis and improvement of Yoon et al.'s hash-based user authentication scheme
    Wang Bang-Ju
    Li Shu-Hua
    Zhang Huan-Guo
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 480 - +
  • [24] Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card
    Amin, Ruhul
    Maitra, Tanmoy
    Giri, Debasis
    Srivastava, P. D.
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (03) : 4629 - 4659
  • [25] Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card
    Ruhul Amin
    Tanmoy Maitra
    Debasis Giri
    P. D. Srivastava
    Wireless Personal Communications, 2017, 96 : 4629 - 4659
  • [26] Cryptanalysis and the improvement of Kim et al.'s password authentication schemes
    Giri, Debasis
    Srivastava, P. D.
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2007, 4812 : 156 - 166
  • [27] Further improvement of Juang et al.'s password-authenticated key agreement scheme using smart cards
    He, Debiao
    Chen, Jianhua
    Hu, Jin
    KUWAIT JOURNAL OF SCIENCE & ENGINEERING, 2011, 38 (2A): : 55 - 68
  • [28] Improvement of Tseng et al.'s authenticated encryption scheme
    Hwang, SJ
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 165 (01) : 1 - 4
  • [29] Cryptanalysis and improvement on Chang et al.'s signature scheme
    Wang, Qing-Long
    Han, Zhen
    Geng, Xiu-Hua
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL II, PROCEEDINGS, 2007, : 112 - 114
  • [30] Improvement of Li et al.'s proxy signature scheme
    Dept. of Electrical and Computer Eng., Kangwon National University, Chuncheon, Korea, Republic of
    不详
    WSEAS Trans. Syst., 2006, 1 (305-311):