期刊文献+

AN IMPROVED REMOTE PASSWORD AUTHENTICATION SCHEME WITH SMART CARD

AN IMPROVED REMOTE PASSWORD AUTHENTICATION SCHEME WITH SMART CARD
下载PDF
导出
摘要 This paper analyzes the security performance of a latest proposed remote two-factor user authentication scheme and proposes an improved scheme based on the dynamic ID to avoid the attacks it suffers. Besides this, in our proposed scheme the password is no longer involved in the calculation of verification phase which makes our scheme more secure and costs less than the old one. At last we analyze the performance of our proposed scheme to prove it provides mutual authentication between the user and the server. Moreover, it also resists password guessing attack, server and user masquerade attack and replay attack effectively. This paper analyzes the security performance of a latest proposed remote two-factor user authentication scheme and proposes an improved scheme based on the dynamic ID to avoid the attacks it suffers. Besides this, in our proposed scheme the password is no longer involved in the calculation of verification phase which makes our scheme more secure and costs less than the old one. At last we analyze the performance of our proposed scheme to prove it provides mutual authentication between the user and the server. Moreover, it also resists password guessing attack, server and user masquerade attack and replay attack effectively.
作者 Jing Chao
机构地区 Department of NetWork
出处 《Journal of Electronics(China)》 2012年第6期550-555,共6页 电子科学学刊(英文版)
基金 Supported by Natural Science Funds of Shanxi Province(No. 2010021016-3)
关键词 Two-factor Password authentication Smart card Dynamic ID Two-factor Password authentication Smart card Dynamic ID
  • 相关文献

参考文献15

  • 1L. Lamport. Password authentication with insecurecommunication. Communications of the ACM, 24(1981)11, 770-772.
  • 2R. Lennon, S. Matyas, and C. Meyer. Cryptographicauthentication of time-invariant quantities. IEEETransactions on Communications, 29(1981)6, 773-777.
  • 3W. H. Yang and S. P. Shieh. Password Authentica-tion Schemes with Smart Cards. Computers & Secu-rity, 18(1999)8, 727-733.
  • 4T. Wu and H. Sung. Authenticating passwords overan insecure channel. Computers & Security, 15(1996)5,431-439.
  • 5H. M. Sun. An efficient remote user authenticationscheme using smart cards. IEEE Transactions onConsumer Electronics 46(2000)4, 958-961.
  • 6C. C. Lee, M. S. Hwang, and W. P. Yang. A flexibleremote user authentication scheme using smart cards.ACM Operating Systems Review, 36(2002)3, 46-52.
  • 7J. J. Shen, C. W. Lin, and M. S. Hwang. A modifiedremote user authentication scheme using smart cards.IEEE Transactions orz Consumer Electronics,49(2003)2, 414-416.
  • 8Z. Hao and N. H. Yu. A security enhanced remotepassword authentication scheme using smart card.2nd International Symposium on Data,Privacy andE-Commerce, ISDPE 2010, Buffalo, NY, UnitedStates, Sep. 2010, 56-60.
  • 9W. C. Ku, S. T. Chang, and M. H. Chiang. Furthercryptanalysis of fingerprint-based remote user au-thentication scheme using smartcards. IEEE Elec-tronics Letters, 41(2005)5, 240-241.
  • 10M. K. Khan and J. Zhang. Improving the securityof ’a flexible biometrics remote user authenticationscheme’. Computer Standards & Interfaces, 29(2007)1,82-85.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部