Skip to main content

Cryptanalysis of Encrypted Remote User Authentication Scheme by Using Smart Card

  • Conference paper
Advances in Computer Science and its Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 279))

Abstract

Remote user authentication scheme is one of the most convenient authentication schemes to deal with secret data over insecure channels. In 2012, Yassin et al. proposed encrypted remote user authentication scheme by using smart card. They claimed that their scheme is secure against various attacks. In this paper, we demonstrate that their scheme is insecure and vulnerable to outsider attack, smart card stolen attack, offline password guessing attack, and masquerade attack.

This research was funded by the MSIP(Ministry of Science, ICT&Future Planning), Korea in the ICT R&D Program 2013.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chien, H., Chen, C.: A remote authentication scheme preserving user anonymity. In: Proc. Advanced Information Networking and Applications, vol. 2, pp. 245–248 (2005)

    Google Scholar 

  2. Lee, Y., Nam, J., Won, D.: Security enhancement of a remote user authentication scheme using smart cards. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 508–516. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  3. Nam, J., Kim, S., Park, S., Won, D.: Security analysis of a nonce-based user authentication scheme using smart cards. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 90(1), 299–302 (2007)

    Article  Google Scholar 

  4. Yi, W., Kim, S., Won, D.: Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments. In: Gervasi, O., Taniar, D., Murgante, B., Laganà, A., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2009, Part II. LNCS, vol. 5593, pp. 182–190. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  5. Jin, Q., Lee, K., Won, D.: Cryptanalysis of a two-factor user authentication scheme over insecure channels. In: ISA 2012 (2012)

    Google Scholar 

  6. He, D., Wu, S.: Security flaws in smart card based authentication scheme for multi server environment. Wireless Personal Communications, 0929–6212 (2012)

    Google Scholar 

  7. Son, K., Han, D., Won, D.: A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards. IEICE Transactions on Communications 95(5), 1819–1821 (2012)

    Article  Google Scholar 

  8. Das, M.L., Saxena, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electionics 50(2), 629–631 (2004)

    Article  Google Scholar 

  9. Wang, Y.Y., Liu, J.Y., Xiao, F.X., Dan, J.: A more efficient and secure dynamic ID-based remote user authentication scheme. Computer Communications 4(32), 583–585 (2009)

    Article  Google Scholar 

  10. Yassin, A.A., Jin, H., Ibrahim, A., Zou, D.: Encrypted Remote User Authentication Scheme by Using Smart Card. In: Wang, F.L., Lei, J., Gong, Z., Luo, X. (eds.) WISM 2012. LNCS, vol. 7529, pp. 314–323. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jongho Mun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mun, J., Kim, J., Jeon, W., Lee, Y., Won, D. (2014). Cryptanalysis of Encrypted Remote User Authentication Scheme by Using Smart Card. In: Jeong, H., S. Obaidat, M., Yen, N., Park, J. (eds) Advances in Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 279. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41674-3_60

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41674-3_60

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41673-6

  • Online ISBN: 978-3-642-41674-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics