...
首页> 外文期刊>International journal of communication systems >Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'
【24h】

Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'

机译:密码分析和“鲁棒的基于智能卡的远程用户密码认证方案”的改进

获取原文
获取原文并翻译 | 示例
           

摘要

With the use of smart card in user authentication mechanisms, the concept of two-factor authentication came into existence. This was a forward move towards more secure and reliable user authentication systems. It elevated the security level by requiring a user to possess something in addition to know something. In 2010, Sood et al. and Song independently examined a smart-card-based authentication scheme proposed by Xu et al. They showed that in the scheme of Xu et al., an internal user of the system can turn hostile to impersonate other users of the system. Both of them also proposed schemes to improve the scheme of Xu et al. Recently, Chen et al. identified some security problems in the improved schemes proposed by Sood et al. and Song. To fix these problems, Chen et al. presented another scheme, which they claimed to provide mutual authentication and withstand lost smart card attack. Undoubtedly, in their scheme, a user can also verify the legitimacy of server, but we find that the scheme fails to resist impersonation attacks and privileged insider attack. We also show that the scheme does not provide important features such as user anonymity, confidentiality to air messages, and revocation of lost/stolen smart card. Besides, the scheme defies the very purpose of two-factor security. Furthermore, an attacker can guess a user's password from his or her lost/stolen smart card. To meet these challenges, we propose a user authentication method with user anonymity. We show through analysis and comparison that the proposed scheme exhibits enhanced efficiency in contrast to related schemes, including the scheme of Chen et al. Copyright (c) 2013 John Wiley & Sons, Ltd.
机译:随着智能卡在用户身份验证机制中的使用,二元身份验证的概念应运而生。这是朝着更加安全和可靠的用户身份验证系统迈进的一步。它要求用户除了了解某些内容外还拥有一些内容,从而提高了安全级别。在2010年,Sood等人。 Song和Song独立研究了Xu等人提出的基于智能卡的身份验证方案。他们表明,在Xu等人的方案中,系统的内部用户可能变得敌对,以冒充系统的其他用户。他们俩都提出了改进Xu等人方案的方案。最近,Chen等。在Sood等人提出的改进方案中发现了一些安全问题。和宋为了解决这些问题,Chen等。提出了另一种方案,他们声称可以提供相互身份验证并可以承受丢失的智能卡攻击。毫无疑问,在他们的方案中,用户还可以验证服务器的合法性,但是我们发现该方案无法抵抗模拟攻击和特权内部攻击。我们还表明,该方案不提供重要的功能,例如用户匿名性,对空中消息的保密性以及对丢失/被盗的智能卡的撤销。此外,该方案没有达到两因素安全的目的。此外,攻击者可以从丢失或被盗的智能卡中猜测用户的密码。为了应对这些挑战,我们提出了一种具有用户匿名性的用户身份验证方法。通过分析和比较我们发现,与包括Chen等人的方案在内的相关方案相比,该方案具有更高的效率。版权所有(c)2013 John Wiley&Sons,Ltd.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号