Advertisement

Improved Password Mutual Authentication Scheme for Remote Login Network Systems

  • Younghwa An
Part of the Communications in Computer and Information Science book series (CCIS, volume 263)

Abstract

Password-based authentication schemes have been widely adopted to protect resources from unauthorized access. In 2008, Chang-Lee proposed a friendly password mutual authentication scheme to avoid the security weaknesses of Wu-Chieu’s scheme. In this paper, we have shown that Chang-Lee’s scheme is vulnerable to the forgery attack and password guessing attack, etc. Also, we proposed the improved scheme to overcome these security weaknesses, even if the secret information stored in the smart card is revealed. As a result of security analysis, the proposed scheme is secure against the forgery attack and password guessing attack, etc. And the performance of the proposed scheme is more efficient than that of Chang-Lee’s scheme in terms of the computational complexities.

Keywords

Authentication Forgery Attack Password Guessing Attack 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM 24(11), 770–772 (1981)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Hwang, M.S., Li, L.H.: A New Remote User Authentication Scheme Using Smart Cards. IEEE Transactions on Consumer Electronics 46, 28–30 (2000)CrossRefGoogle Scholar
  3. 3.
    Sun, H.M.: An Efficient Remote User Authentication Scheme Using Smart Cards. IEEE Transactions on Consumer Electronics 46(4), 958–961 (2000)CrossRefGoogle Scholar
  4. 4.
    Wu, S.T., Chieu, B.C.: A User Friendly Remote Authentication Scheme with Smart Cards. Computers & Security 22(6), 457–550 (2003)CrossRefGoogle Scholar
  5. 5.
    Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Further Improvements of an Efficient Password based Remote User Authentication Scheme Using Smart Cards. IEEE Transactions on Consumer Electronics 50(2), 612–614 (2004)CrossRefGoogle Scholar
  6. 6.
    Yang, C.C., Wang, R.C.: Cryptanalysis of a User Friendly Remote Authentication Scheme with Smart Cards. Computers & Security 223(5), 425–427 (2004)CrossRefGoogle Scholar
  7. 7.
    Chang, C.C., Lee, C.Y.: A Friendly Password Mutual Authentication Scheme for Remote Login Network Systems. International Journal of Multimedia and Ubiquitous Engineering 3(1), 59–63 (2008)Google Scholar
  8. 8.
    Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  9. 9.
    Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Transactions on Computers 51(5), 541–552 (2002)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Younghwa An
    • 1
  1. 1.Division of Computer and Media Information EngineeringYongin-siKorea

Personalised recommendations