期刊文献+

基于动态ID的远程用户交互认证方案 被引量:2

Remote User Mutual Authentication Scheme Based on Dynamic ID
下载PDF
导出
摘要 讨论了文献[13]提出的一个基于身份加密的智能卡认证方案,指出其不能抵抗智能卡丢失攻击、内部攻击和冒充攻击等,且不具备用户匿名性和前向安全性,在临时会话密钥协商和智能卡撤销操作上也存在缺陷。通过引入椭圆曲线公钥密码技术和注册随机因子,提出了一个基于动态ID的远程用户交互认证方案并对其进行分析。结果表明,新方案弥补了原方案的不足,且具有较高的效率。 A smart card-based authentication scheme using user identity cryptography was recently proposed by Chang et al. The scheme is found to be vulnerable to smart card loss attack, insider attack, impersonation attack, etc. It also has problems in session key agreement phase and smart card revocation phase. In addition, the scheme cannot achieve user anonymity and forward secrecy. This paper presents a dynamic ID-based remote user mutual authentication scheme by introducing the elliptic-curve public-key cryptography and registration random factor. Security and efficiency analysis shows that the new scheme eliminates the defects of Chang et al. ' s scheme while keeping the high performance.
出处 《信息工程大学学报》 2014年第3期262-269,共8页 Journal of Information Engineering University
基金 国家973计划资助项目(2012CB315905 2012CB315901)
关键词 身份认证 动态ID 智能卡 椭圆曲线密码体制 authentication dynamic identity smart card elliptic curve cryptography
  • 相关文献

参考文献20

  • 1Lamport L. Password authentication with insecure communication [ J ]. Communications of ACM, 1981, 24 (11 ) : 770-772.
  • 2Das M L, Saxena A, Gulati V P. A dynamic ID-based remote user authentication scheme[ J]. IEEE Transactions on Consumer Electronics, 2004, 50 (2): 629-631.
  • 3Awasthi A K. Comment on a dynamic ID-based remote user authentication scheme [ J]. Transaction on Cryptology, 2004, 1 (2) :15-16.
  • 4Zhang X, Feng Q, Li M. A modified dynamic ID-based remote user authentication scheme[ C ]//Proceedings of the 2006 In- ternational Conference on Communications, Circuits and Systems. 2006: 1602-1604.
  • 5Liao I E, Lee C C, Hwang M S. Security enhancement for a dynamic ID-based remote user authentication scheme[ C]//Pro- ceedings of the International Conference on the Next Generation Web Services Practices. 2005 : 22-26.
  • 6Misbahuddin M, Bindu C S. Cryptanalysis of Liao-Lee-Hwang' s dynamic ID Scheme[ J]. International Journal of Network Se- curity, 2008, 6(2): 211-213.
  • 7Wang Y Y, Liu J Y, Xiao F X, et al. A more efficient and secure dynamic ID-based remote user authentication scheme[ J]. Computer Communications, 2009, 32(4): 583-585.
  • 8Ahmed M A, Lakshmi D R, Sattar S A. Cryptanalysis of a more efficient and secure dynamic ID-based remote user authentica- tion scheme[ J]. International Journal of Network Security & Its Applications, 2009, 1 (3) : 32-37.
  • 9Yeh K H, Su C H, Lo N W,et al. Two robust remote user authentication protocols using smart cards[ J]. The Journal of Sys- tems and Software, 2010, 83( 12): 2556-2565.
  • 10Khan M K, Kim S K, Alghathbar K. Cryptanalysis and security enhancement of a more efficient & secure dynamic ID-based remote user authentication scheme [ J ]. Computer Communications, 2011, 34 ( 3 ) : 305-309.

二级参考文献31

  • 1冯登国,陈伟东.基于口令的安全协议的模块化设计与分析[J].中国科学(E辑),2007,37(2):223-237. 被引量:14
  • 2A Shimizu,T Horioka, H lnagaki. A password authentication method for contents communication on the intemet [ J ]. IEICE Trans Commun,1998, E81-B(8) : 1666 - 1673.
  • 3M Sandirigama, A Shimizu, M T Noda. Simple and secure password authentication protocol (SAS) [J]. IEICE Trans. Commun, 2000, E83-B(6): 1363 - 1365.
  • 4C L Lin,H M Sun,T Hwang. Attacks and solutions an strong-password authentication [J]. IEICE Trans. Commun, 2001, E84-B (9) : 2622 -2627.
  • 5A Shimizu. A dynamic password authentication method by one-way function [J]. IEICE Trans, 1990,J73-D-I(7) :630 - 636.
  • 6N Haller.The S/KEY(TM) one-time password system [A]. Proc Internet Society Symposium on Network and Distributed System Security[C] .San Diego, USA: ISSNDSS, 1994.151 - 158.
  • 7A J Menezes, P C van Oorschot, S A Vanstone. Handbook of Applied Cayptography [ M]. Boca Raton, USA : CRC Press, 1997,385 - 424.
  • 8Tsai C S, Lee C C, and Hwang M S. Password authentication schemes: current status and key issues[J]. International Journal of Network Security, 2006, 3(2): 101-115.
  • 9Chang C C and Wu T C. Remote password authentication with smart cards[J]. IEE Proceedings-E Computers and Digital Techniques, 1993, 138(3): 165-168.
  • 10Ku W C and Chen S M. Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards[J]. IEEE Transactions on Consumer Electronics, 2004, 50(1): 204-207.

共引文献28

同被引文献19

  • 1WANG D, WANG P. On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solu- tions [J]. Computer Networks, 2014, 73:41-57.
  • 2BONNEAU J. The science of guessing: analyzing an anonymized corpus of 70 million passwords [ C]//Proceedings of the 2012 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2012:538 -552.
  • 3DAS M. Two-factor user authentication in wireless sensor networks [ J]. IEEE Transactions on Wireless Communications, 2009, 8(3) : 1086 - 1090.
  • 4HE D, GAO Y, CHAN S, et al. An enhanced two-factor user au- thentication scheme in wireless sensor networks [ J]. Ad Hoc Sensor & Wireless Networks, 2010, 10(4): 361-371.
  • 5XUE K, MA C, HONG P, et al. A temporal-credential-based mutu- al authentication and key agreement scheme for wireless sensor net- works [ J]. Journal of Network and Computer Applications, 2012, 36(1): 316-323.
  • 6MESSERGES T S, DABBISH E A, SLOAN R H. Examining smart- card security under the threat of power analysis attacks [ J]. IEEE Transactions on Computers, 2002, 51(5): 541-552.
  • 7KIM T H, KIM C, PARK I. Side channel analysis attacks using AM demodulation on commercial smart cards with seed [ J]. Journal of Systems and Software, 2012, 85( 12): 2899 -2908.
  • 8WANG D, WANG P. Offline dictionary attack on password authen- tication schemes using smart cards [ C]// Proceedings of the 16th Information Security Conference. Berlin: Springer, 2014: 1- 16.
  • 9MA C, WANG D, ZHAO S. Security flaws in two improved remote user authentication schemes using smart cards [ J]. International Journal of Communication Systems, 2014, 27(10) : 2215 -2227.
  • 10NEWELL A, YAO H, RYKER A. Node-capture resilient key estab- lishment in sensor networks: design space and new protocols [ J]. ACM Computing Surveys, 2014, 47(2) : 1 -24.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部