首页> 外文期刊>Journal of VLSI signal processing >Breaking Three Remote user Authentication Systems for Mobile Devices
【24h】

Breaking Three Remote user Authentication Systems for Mobile Devices

机译:打破三种用于移动设备的远程用户身份验证系统

获取原文
获取原文并翻译 | 示例

摘要

Smart-card-based user authentication is a significant security mechanism that allows remote users to be granted access to services and resources in distributed computing environments. In this paper, we review three password-based authentication schemes with smart cards proposed by Mishra et al., in JISA 2015, Wu et al. in SCN 2015 and Moon et al. in IJNS 2017, respectively. We demonstrate that: (1) Despite being armed with a formal security proof in all schemes, Mishra et al.’s scheme actually cannot achieve the claimed feature of user anonymity and is vulnerable to a new insider attack scenario; and (2) Wu et al.’s scheme remains being susceptible to de-synchronization attack as they stated to overcome the weaknesses of Kumar et al.’s scheme. (3) Moon et al.’s scheme cannot achieve user anonymity and is susceptible to a novel impersonation attack. Furthermore, with the cryptanalysis of these three schemes and our previous protocol design and analysis experience, we figure out two principles to design more robust smart-card-based user authentication schemes. The proposed principles would be helpful to protocol designers for proposing schemes with desirable user friendliness and security.
机译:基于智能卡的用户身份验证是一种重要的安全机制,可允许远程用户访问分布式计算环境中的服务和资源。在本文中,我们回顾了Mishra等人在JISA 2015和Wu等人中提出的三种基于密码的智能卡身份验证方案。在SCN 2015和Moon等人的文章中分别在IJNS 2017中我们证明:(1)尽管在所有方案中都配备了正式的安全证明,但Mishra等人的方案实际上无法实现所声称的用户匿名功能,并且容易受到新的内部攻击方案的攻击; (2)Wu等人的方案指出,他们克服了Kumar等人方案的弱点,仍然容易受到去同步攻击的攻击。 (3)Moon等人的方案无法实现用户匿名,并且容易受到新型假冒攻击。此外,通过对这三种方案的密码分析以及我们先前的协议设计和分析经验,我们得出了两个原理来设计更健壮的基于智能卡的用户身份验证方案。所提出的原理将有助于协议设计者提出具有期望的用户友好性和安全性的方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号