期刊文献+

基于动态ID的远程认证方案的分析和改进 被引量:3

Analysis and improvements of dynamic identity-based remote user authentication scheme
下载PDF
导出
摘要 分析了段晓毅等人提出的动态ID的远程认证方案,发现该方案不能抵御离线密码字猜测攻击,重放攻击,冒充服务器攻击,且在相互认证后不能提供会话密钥。提出了一个改进方案,改进后的方案克服了以上的安全缺陷,且用户可自由选择登录系统的密码,相互认证后用户和服务器共享一个会话密钥。 In this paper, Duan et al.’s scheme is analyzed. It is showed that this scheme is insecure against offline-guessing attack, replay attack, forgery attack and a session key doesn’t be provided after mutual authentication. An improved scheme is proposed that overcomes the above-mentioned security flaws with not affecting the merits of the original scheme. The proposed scheme not only allows the users to choose and change their passwords freely, but also generates a session key agreed by the user and the server.
出处 《计算机工程与应用》 CSCD 2014年第22期126-129,共4页 Computer Engineering and Applications
基金 重庆市教育技术委员会项目(No.KJ121103) 重庆三峡学院科研项目(No.11ZD-15)
关键词 用户认证 智能卡 离线密码字猜测攻击 相互认证 user authentication smart card offline password guessing attack mutual authentication
  • 相关文献

参考文献10

  • 1Lamport L.Password authentication with insecure com- munication[J].Communit:ation of the ACM, 1981,24 ( 11 ) : 770-772.
  • 2Lennon R E,Matyas S M,Mayer C H.Crytographic authen- tication of time-invariaat quantities[J].IEEE Transactionson Communications, 1981,29(6) : 773-777.
  • 3Yen S M, Liao K H.Shared authentication token secure replay and key attack[J].Information Processing Letters, 1997,62(2) :78-80.
  • 4Hwang M S, Li L H.A new remote user authentication scheme using smart cards[J].IEEE Transactions on Con- sumer Electronics, 2000,46( 1 ) : 28-30.
  • 5Wang Y Y,Liu J Y,Xiao F X, et al.A more efficient and secure dynamic ID-based remote user authentication scheme[J].Computer Communications, 2009,32 (4) : 583 -585.
  • 6张少武,李毅,曾立君,韩继红.基于身份的远程用户认证方案[J].计算机工程,2008,34(12):149-151. 被引量:5
  • 7Das M L, Saxena A, Gulati V P.A dynamic ID-based remote user authentication scheme[J].IEEE Transactions on Con- sumer Electronics, 2004,50(2) : 629-631.
  • 8Liao I E, Lee C C, Hwang M S.Security enhancement for a dynamic ID-based remote user authentication scheme[C]// Proceedings of International Conference Next Genera- tion Web Services Practices,Seoul,Korea,2005:
  • 9Wang Y Y, Liu J Y, Xiao F X, et al.A more efficient and secure dynamic ID-based remote user authentication scheme[J].Computer Communication, 2009,4(32) : 583-585.
  • 10段晓毅,张其善,刘建伟.基于动态ID的远程认证方案的改进[J].北京航空航天大学学报,2007,33(5):565-567. 被引量:2

二级参考文献13

  • 1胡斌,王永红.一种安全的远程用户认证方案[J].计算机工程,2007,33(7):146-148. 被引量:1
  • 2Lamport L.Password authentication with insecure communication[J].Communication of ACM,1981,24:770-772
  • 3Hwang M S,Li L H.A new remote user authentication scheme using smart cards[J].IEEE Transactions on Consumer Electronics,2000,46(1):28-30
  • 4Ku W C,Chen S M.Weakness and improvements of an efficient password based user authentication scheme using smart cards[J].IEEE Trans Consumer Electronic,2004,50(1):204-207
  • 5Yoon E J,Ryu E K,Yoo K Y.Further improvement of an efficient password based remote user authentication scheme using smart cards[J].IEEE Trans Consumer Electronic,2004,50(2):612-614
  • 6Manik Lal Das,Ashutosh Saxena,Ved P Gulati.A dynamic ID-based remote user authentication scheme[J].IEEE Transactions on Consumer Electronics,2004,50(2):629-631
  • 7Liao I-En,Lee Cheng-Chi,Hwang Min-Shiang.Security enhancement for a dynamic ID-based remote user authentication scheme[C]// Next Generation Web Services Pracitces.Seoul,KOREA:IEEE,2005
  • 8Das M L, Saxena A, Gulati V E et al. A Novel Remote User Authentication Scheme Using Bilinear Pairings[J]. Computers & Security, 2005, 24(2): 35-40.
  • 9Chou J S, Chen Yalin, Lin J Y. Improvement of Manik et al.'s Remote User Authentication Scheme[Z]. (2005-07-25). http://eprint. iacr.org/2005/450.pdf.
  • 10Thulasi G Das M L, Saxena A. Cryptanalysis of Recently Proposed Remote User Authentication Schemes[Z]. (2006-06-04). http:// eprint.iacr.org/2006/028.pdf.

共引文献5

同被引文献28

  • 1PIPPAL R S,JAIDHAR C D,TAPASWI S.Comments on symmetric key encryption based smart card authentication scheme[C]//Proceedings of the 2nd International Conference on Computer Technology and Development.Cario:IEEE,2010:482-484.
  • 2SORAM R,CHATTERJEE R,ROY D P,et al.A remote smart card authentication protocol using elliptic curves[J].International journal of computer science&information technologies,2012,29(3):3856-3866.
  • 3PIPPAL R S,GUPTA P,SINGH R.A novel smart card authentication scheme using image encryption[J].International journal of computer applications,2013,72(9):8-14.
  • 4MUNIYANDI A P,RAMASAMY R.Password based remote au-thentication scheme using ECC for smart card[C]//Proceedingsof the 2011 International Conference on Communication,Com-puting&Security.Odisha,India:International Conference onCommunication,2011:1-8.
  • 5WEI J H,LIU W F,HU X X.Cryptanalysis and improvement of a robust smart card authentication scheme for multiserver architecture[J].Wireless personal communications,2014,77(3):2255-2269.
  • 6PIPPAL R S,GUPTA P,SINGH R.Dynamic encryption key based smart card authentication scheme[J].International journal of computer applications,2013,72(9):15-18.
  • 7LI X,NIU J W,KUMARI S,et al.An enhancement of a smart card authentication scheme for multi-server architecture[J].Wireless personal communications,2015,80(1):175-192.
  • 8LI X,NIU J,KHAN M K,et al.An enhanced smart card based remote user password authentication scheme[J].Journal of network&computer applications,2013,36(5):1365-1371.
  • 9于涛,叶顶锋.素数域椭圆曲线密码在智能卡上的设计与实现[J].计算机仿真,2009,26(3):132-135. 被引量:4
  • 10陈立全,何营营,王玲玲.M2M网络上的改进直接匿名认证方案[J].东南大学学报(自然科学版),2012,42(4):604-608. 被引量:3

引证文献3

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部