期刊文献+

A New Secure Password Authentication Scheme Using Smart Cards

A New Secure Password Authentication Scheme Using Smart Cards
原文传递
导出
摘要 Thirteen security requirements for an ideal password authentication scheme using smart cards are listed and a new smart card based password authentication scheme with identity anonymity is proposed. The new scheme can satisfy all the listed ideal security requirements and has the following merits: (1) it can resist all the attacks listed in introduction; (2) less storage memory requirement due to no verification table stored in server; (3) low computational cost due to hash functions based operations; (4) even if the smart card is lost, the new system is still secure; (5) As user identity is anonymous, this scheme is more practical. The new proposed scheme can be applied in source constraint networks. Thirteen security requirements for an ideal password authentication scheme using smart cards are listed and a new smart card based password authentication scheme with identity anonymity is proposed. The new scheme can satisfy all the listed ideal security requirements and has the following merits: (1) it can resist all the attacks listed in introduction; (2) less storage memory requirement due to no verification table stored in server; (3) low computational cost due to hash functions based operations; (4) even if the smart card is lost, the new system is still secure; (5) As user identity is anonymous, this scheme is more practical. The new proposed scheme can be applied in source constraint networks.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期739-743,共5页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foundation of China (60373087, 60473023).
关键词 PASSWORD password authentication hash function ATTACK smart card password password authentication hash function attack smart card
  • 相关文献

参考文献10

  • 1Wang X M,Zhang W F,Zhang J S et al.Cryptanalysis and Improvement on Two Efficient Remote User Authentication Scheme Using Smart Cards[].Computer Standards & Inter- faces.2007
  • 2Yoon E J,Lee E J,Yoo K Y.Cryptanalysis of Wang et al’s Remote User Authentication Scheme Using Smart Cards[].Proc Fifth International Conference on Information Tech- nology: New Generations.2008
  • 3Tsai C S,Lee C C,Hwang M S.Password Authentication Schemes: Current Status and Key Issues[].International Journal of Network Security.2006
  • 4Diffie W,Hellman M E.New directions in cryptography[].IEEE Transactions on Information Theory.1976
  • 5LLamport.PasswordAuthenticationwithInsecureCommunication犤J犦[].CommunicationsoftheACM.1981
  • 6Lee C C,Li L H,Hwang M S.A remote user authentication sche-me using hash functions[].ACM Operating Systems Review.2002
  • 7Hwang,M-S,Li,LH.A new remote user authentication scheme using smart cards[].IEEE Transactions on Consumer Electronics.2000
  • 8Sung-Woon Lee,Hyun-Sung Kim,and Kee-Young Yoo.Improved Efficient Remote User Authentication Scheme using Smart Cards[].IEEE Transactions on Consumer Electronics.2004
  • 9Lu R X,Cao Z F.Efficient remote user authentication scheme using smart card[].Computer Networks.2005
  • 10Juang WS.Efficient password authenticated key agreement using smart cards[].Computers and Security.2004

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部