首页> 外文会议>2011 IEEE 30th International Performance, Computing, and Communications Conference >Cryptanalysis and security enhancement of an advanced authentication scheme using smart cards, and a key agreement scheme for two-party communication
【24h】

Cryptanalysis and security enhancement of an advanced authentication scheme using smart cards, and a key agreement scheme for two-party communication

机译:密码分析和使用智能卡的高级身份验证方案的安全性增强,以及用于两方通信的密钥协商方案

获取原文

摘要

In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart cards. We note that this scheme has already been shown vulnerable to the off-line password guessing attack by Tapiador et al. We perform a further cryptanalysis on this protocol and observe that it is prone to the clogging attack, a kind of denial of service (DOS) attack. We observe that all smart card based authentication protocols which precede the one by Song, and require the server to compute the computationally intensive modular exponentiation, like the one by Xu et al., or Lee et al., are prone to the clogging attack. Further, some recent protocols by Li, and Wang et al. are also vulnerable to the clogging attack. We then suggest an improvement on the protocol to prevent the clogging attack. The other protocol we consider is a two-party identity-based authenticated key agreement protocol by Hölbl et al. They have devised two such protocols in their work. They call them Protocol 1 and Protocol 2. Both the protocols have already been shown vulnerable to the insider attack in a recent work by Chen et al. Here we consider Protocol 2 and show its vulnerability to a simple man-in-the-middle attack where the adversary does not know or calculate either party''s private key, or the session key. Protocol 2 by Hölbl et al is an improvement over a previous work by Tseng. This makes the Tseng''s protocol vulnerable to the attack we illustrate. We further suggest an additional step for these protocols to make them immune against the man-in-the-middle attack.
机译:在这项工作中,我们考虑用于执行密码分析和安全性增强的两种协议。 Song的第一个是基于智能卡的密码身份验证方案。我们注意到,该方案已经显示出容易受到Tapiador等人的离线密码猜测攻击的攻击。我们对该协议进行了进一步的密码分析,并观察到它很容易遭受堵塞攻击(一种拒绝服务(DOS)攻击)。我们观察到,所有基于智能卡的身份验证协议都在Song之前,并且要求服务器计算大量计算量的模块化幂运算,例如Xu等人或Lee等人的协议,都容易受到阻塞攻击的影响。此外,Li和Wang等人最近的一些协议。也容易受到堵塞攻击的影响。然后,我们建议对协议进行改进,以防止阻塞攻击。我们考虑的另一种协议是Hölbl等人基于两方身份的认证密钥协议。他们在工作中设计了两个这样的协议。他们将它们分别称为协议1和协议2。在Chen等人的最新工作中,这两个协议都已经显示出容易受到内部攻击。在这里,我们考虑协议2并显示其容易受到中间人攻击的攻击,在这种中间人攻击中,对手不知道或不计算任何一方的私钥或会话密钥。 Hölbl等人的协议2是对Tseng先前工作的改进。这使Tseng的协议容易受到我们说明的攻击。我们进一步建议这些协议采取其他步骤,以使它们免受中间人攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号