...
首页> 外文期刊>The Journal of Systems and Software >Two robust remote user authentication protocols using smart cards
【24h】

Two robust remote user authentication protocols using smart cards

机译:使用智能卡的两种可靠的远程用户身份验证协议

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

With the rapid growth of electronic commerce and enormous demand from variants of Internet based applications, strong privacy protection and robust system security have become essential requirements for an authentication scheme or universal access control mechanism. In order to reduce implementation complexity and achieve computation efficiency, design issues for efficient and secure password based remote user authentication scheme have been extensively investigated by research community in these two decades. Recently, two well-designed password based authentication schemes using smart cards are introduced by Hsiang and Shih (2009) and Wang et al. (2009), respectively. Hsiang et al. proposed a static ID based authentication protocol and Wang et al. presented a dynamic ID based authentication scheme. The authors of both schemes claimed that their protocol delivers important security features and system functionalities, such as mutual authentication, data security, no verification table implementation, freedom on password selection, resistance against ID-theft attack, replay attack and insider attack, as well as computation efficiency. However, these two schemes still have much space for security enhancement, in this paper, we first demonstrate a series of vulnerabilities on these two schemes. Then, two enhanced protocols with corresponding remedies are proposed to eliminate all identified security flaws in both schemes.
机译:随着电子商务的飞速发展以及基于Internet的应用程序的巨大需求,强大的隐私保护和强大的系统安全性已成为身份验证方案或通用访问控制机制的基本要求。为了降低实现的复杂性并实现计算效率,在过去的二十年中,研究界广泛研究了基于有效和安全的密码的远程用户身份验证方案的设计问题。最近,Hsiang和Shih(2009)以及Wang等人介绍了两种使用智能卡设计良好的基于​​密码的身份验证方案。 (2009)。祥等。提出了一个基于静态ID的身份验证协议,Wang等人。提出了一种基于动态ID的身份验证方案。两种方案的作者都声称,它们的协议提供了重要的安全功能和系统功能,例如相互认证,数据安全,没有验证表实现,自由选择密码,抵抗ID盗窃攻击,重播攻击和内部人员攻击,以及作为计算效率。但是,这两种方案仍然有很大的安全增强空间,在本文中,我们首先演示这两种方案的一系列漏洞。然后,提出了两种具有相应补救措施的增强协议,以消除两种方案中所有已识别的安全漏洞。

著录项

  • 来源
    《The Journal of Systems and Software》 |2010年第12期|p.2556-2565|共10页
  • 作者单位

    Department of Information Management, National Taiwan University of Science and Technology, Taipei, 106, Taiwan. ROC;

    School of Information Systems, Singapore Management University, Singapore 178902, Singapore;

    Department of Information Management, National Taiwan University of Science and Technology, Taipei, 106, Taiwan. ROC;

    School of Information Systems, Singapore Management University, Singapore 178902, Singapore;

    Department of Information Management, National Taiwan University of Science and Technology, Taipei, 106, Taiwan. ROC;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    authentication; cryptanalysis; security; smart card;

    机译:认证;密码分析安全;智能卡;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号