首页> 外文期刊>International journal of communication systems >Security flaws in two improved remote user authentication schemes using smart cards
【24h】

Security flaws in two improved remote user authentication schemes using smart cards

机译:使用智能卡的两种改进的远程用户身份验证方案中的安全漏洞

获取原文
获取原文并翻译 | 示例
       

摘要

Understanding security failures of cryptographic protocols is the key to both patching existing protocols and designing future schemes. In this paper, we analyze two recent proposals in the area of password-based remote user authentication using smart cards. First, we point out that the scheme of Chen et al. cannot achieve all the claimed security goals and report its following flaws: (i) it is vulnerable to offline password guessing attack under their nontamper resistance assumption of the smart cards; and (ii) it fails to provide forward secrecy. Then, we analyze an efficient dynamic ID-based scheme without public-key operations introduced byWen and Li in 2012. This proposal attempts to overcome many of the well-known security and efficiency shortcomings of previous schemes and supports more functionalities than its counterparts. Nevertheless, Wen-Li's protocol is vulnerable to offline password guessing attack and denial of service attack, and fails to provide forward secrecy and to preserve user anonymity. Furthermore, with the security analysis of these two schemes and our previous protocol design experience, we put forward three general principles that are vital for designing secure smart-card-based password authentication schemes: (i) public-key techniques are indispensable to resist against offline password guessing attack and to preserve user anonymity under the nontamper resistance assumption of the smart card; (ii) there is an unavoidable trade-off when fulfilling the goals of local password update and resistance to smart card loss attack; and (iii) at least two exponentiation (respectively elliptic curve point multiplication) operations conducted on the server side are necessary for achieving forward secrecy. The cryptanalysis results discourage any practical use of the two investigated schemes and are important for security engineers to make their choices correctly, whereas the proposed three principles are valuable to protocol designers for advancing more robust schemes. Copyright (C) 2012 John Wiley & Sons, Ltd.
机译:了解加密协议的安全性失败是修补现有协议和设计未来方案的关键。在本文中,我们分析了使用智能卡的基于密码的远程用户身份验证领域中的两个最新建议。首先,我们指出了Chen等人的方案。无法实现所有声称的安全目标并报告其以下缺陷:(i)在智能卡的防篡改假设下,它容易受到脱机密码猜测攻击的攻击; (ii)无法提供前瞻性保密。然后,我们分析了一种有效的基于动态ID的方案,该方案没有由Wen和Li在2012年推出,没有公钥操作。该建议试图克服以前方案的许多众所周知的安全性和效率性缺点,并提供比同类方案更多的功能。但是,Wen-Li的协议容易受到脱机密码猜测攻击和拒绝服务攻击的影响,并且无法提供前向保密性和保留用户匿名性。此外,通过对这两种方案的安全性分析以及我们先前的协议设计经验,我们提出了三个总体原则,这些原则对于设计基于智能卡的安全密码身份验证方案至关重要:(i)公钥技术是不可抗拒的在智能卡的防篡改假设下进行离线密码猜测攻击并保留用户匿名性; (ii)在实现本地密码更新和抵制智能卡丢失攻击的目标时,不可避免的需要权衡; (iii)在服务器端执行至少两次求幂(分别为椭圆曲线点乘法)操作对于实现前向保密性是必要的。密码分析结果不鼓励对这两种方案进行任何实际使用,并且对于安全工程师正确地进行选择非常重要,而所提出的三项原则对于协议设计者推进更健壮的方案非常有价值。版权所有(C)2012 John Wiley&Sons,Ltd.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号