Abstract
Perfect forward secrecy is considered as the most important standard to evaluate a strong authentication scheme. There are many results researched to achieve this property without using hard problems. Recently, the result of Chang et al has some advances such as, the correctness of schemes mutual authentication and session key agreement demonstrated in BAN-logic or the overheads reduction of system implementation. However, in this paper, we prove that their scheme is still vulnerable to impersonation attacks and session key leakage. To overcome those limitations and be practical, we use different notion to propose time efficient scheme conducted in experiment. Our proposed method can be applied for remote user authentication in various scenarios, including systems with user authentication using mobile or wearable devices.
Chapter PDF
Similar content being viewed by others
References
Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11), 770–772 (1981)
Chen, T.H., Chen, Y.C., Shih, W.K., Wei, H.W.: An efficient anonymous authentication protocol for mobile pay-tv. Journal of Network and Computer Applications 34(4), 1131–1137 (2011)
Shin, S., Kim, K., Kim, K.-H., Yeh, H.: A remote user authentication scheme with anonymity for mobile devices. International Journal of Advanced Robotic Systems 9(13), 1–7 (2012)
Liao, I.E., Lee, C.C., Hwang, M.S.: Security enhancement for a dynamic id-based remote user authentication scheme. In: International Conference on Next Generation Web Services Practices, vol. 6(2), pp. 517–522 (2005)
Yoon, E.-J., Yoo, K.-Y.: Improving the dynamic ID-based remote mutual authentication scheme. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 499–507. Springer, Heidelberg (2006)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Yang, J.-H., Chang, C.-C.: An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers and Security 28(3–4), 138–143 (2009)
Yoon, E.-J., Yoo, K.-Y.: Robust ID-based remote mutual authentication with key agreement scheme for mobile devices on ECC. In: IEEE International Conference on Computational Science and Engineering, vol. 2, pp. 633–640 (2009)
Islam, S.H., Biswas, G.P.: A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Journal of Systems and Software 84(11), 1892–1898 (2011)
Wang, K., Pei, W.J., Zou, L.H., Cheung, Y.M., He, Z.Y.: Security of public key encryption technique based on multiple chaotic system. Journal of Physics Letters A 360(2), 259–262 (2006)
Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Journal of Chaos, Solitons & Fractals 37(3), 669–674 (2008)
Guo, C., Chang, C.-C., Sun, C.-Y.: Chaotic maps-based mutual authentication and key agreement using smartcards for wireless communications. Journal of Information Hiding and Multimedia Signal Processing 4(2), 99–109 (2013)
Prasadh, K., Ramar, K., Gnanajeyaraman, R.: Public key cryptosystems based on chaotic chebyshev polynomials. Journal of Engineering and Technology Research 1(7), 122–128 (2009)
Zhi-Hui, L., Yi-Dong, C., Hui-Min, X.: Fast algorithms of public key cryptosystem based on chebyshev polynomials over finite field. The Journal of China Universities of Posts and Telecommunications 18(2), 86–93 (2010)
Chang, C.-C., Lee, C.-Y.: A smart card-based authentication scheme using user identify cryptography. International Journal of Network Security 15(2), 139–147 (2013)
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer System 8, 18–36 (1990)
Xiao, D., Liao, X., Wong, K.: An efficient entire chaos-based scheme for deniable authentication. Journal of Chaos, Solitons & Fractals 23(4), 1327–1331 (2005)
Bergamo, P., Arco, P., Santis, A., Kocarev, L.: Security of public key encryption technique based on multiple chaotic system. IEEE Transactions on Circuits and Systems I 52(7), 1382–1393 (2005)
Das, M.L., Saxena, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics 50(2), 629–631 (2004)
Wang, Y.Y., Kiu, J.Y., Xiao, F.X., Dan, J.: A more efficient and secure dynamic ID-based remote user authentication scheme. Computer Communications 32(4), 583–585 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 IFIP International Federation for Information Processing
About this paper
Cite this paper
Truong, TT., Tran, MT., Duong, AD., Echizen, I. (2015). Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment. In: Federrath, H., Gollmann, D. (eds) ICT Systems Security and Privacy Protection. SEC 2015. IFIP Advances in Information and Communication Technology, vol 455. Springer, Cham. https://doi.org/10.1007/978-3-319-18467-8_32
Download citation
DOI: https://doi.org/10.1007/978-3-319-18467-8_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18466-1
Online ISBN: 978-3-319-18467-8
eBook Packages: Computer ScienceComputer Science (R0)