메뉴 건너뛰기




Volumn 19, Issue 5, 2012, Pages 104-114

Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards

Author keywords

authentication protocol; cryptanalysis; forward secrecy; non tamper resistant; smart card

Indexed keywords

AUTHENTICATION PROTOCOLS; CRYPTANALYSIS; ELECTRONIC BUSINESS; FOLLOWING PROBLEM; FORWARD SECRECY; ID-BASED SCHEME; IMPERSONATION ATTACK; KEY-COMPROMISE IMPERSONATION; KNOWN KEY ATTACKS; NON-TAMPER RESISTANT; OFFLINE PASSWORD GUESSING ATTACK; PARALLEL SESSION ATTACK; PRIVACY PROTECTION; REMOTE USER AUTHENTICATION SCHEMES; ROBUST SYSTEMS; SECURITY ENHANCEMENTS; SECURITY FLAWS; SECURITY GOALS; SECURITY THREATS;

EID: 84868139535     PISSN: 10058885     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1005-8885(11)60307-5     Document Type: Article
Times cited : (28)

References (27)
  • 1
    • 1942423677 scopus 로고    scopus 로고
    • Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
    • Ku WC, Chen SM Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards IEEE Transactions on Consumer Electronics 50 1 2004 204 207
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 204-207
    • Ku, W.C.1    Chen, S.M.2
  • 3
    • 77955312905 scopus 로고    scopus 로고
    • Advanced smart card based password authentication protocol
    • Song RG Advanced smart card based password authentication protocol Computer Standards & Interfaces 32 4 2010 321 325
    • (2010) Computer Standards & Interfaces , vol.32 , Issue.4 , pp. 321-325
    • Song, R.G.1
  • 5
    • 78049322666 scopus 로고    scopus 로고
    • Two robust remote user authentication protocols using smart cards
    • Yeh KH, Su CH, Lo NW Two robust remote user authentication protocols using smart cards Journal of Systems and Software 83 12 2010 2556 2565
    • (2010) Journal of Systems and Software , vol.83 , Issue.12 , pp. 2556-2565
    • Yeh, K.H.1    Su, C.H.2    Lo, N.W.3
  • 6
    • 79956361026 scopus 로고    scopus 로고
    • Secure dynamic identity-based authentication scheme using smart cards
    • Sood KS Secure dynamic identity-based authentication scheme using smart cards Information Security Journal: A Global Perspective 20 2 2011 67 77
    • (2011) Information Security Journal: A Global Perspective , vol.20 , Issue.2 , pp. 67-77
    • Sood, K.S.1
  • 7
    • 52949137008 scopus 로고    scopus 로고
    • Two-factor mutual authentication based on smart cards and password
    • Yang G, Wong DS, Wang H et al. Two-factor mutual authentication based on smart cards and password Journal of Computer and System Sciences 74 7 2008 1160 1172
    • (2008) Journal of Computer and System Sciences , vol.74 , Issue.7 , pp. 1160-1172
    • Yang, G.1    Wong, D.S.2    Wang, H.3
  • 9
    • 84863056589 scopus 로고    scopus 로고
    • Robust smart-cards-based user authentication scheme with user anonymity
    • Wu SH, Zhu YF, Pu Q Robust smart-cards-based user authentication scheme with user anonymity Security and Communication Networks 5 2 2012 236 248
    • (2012) Security and Communication Networks , vol.5 , Issue.2 , pp. 236-248
    • Wu, S.H.1    Zhu, Y.F.2    Pu, Q.3
  • 10
    • 64249125305 scopus 로고    scopus 로고
    • An improved smart card based password authentication scheme with provable security
    • Xu J, Zhu WT, Feng DG An improved smart card based password authentication scheme with provable security Computer Standards & Interfaces 31 4 2009 723 728
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.4 , pp. 723-728
    • Xu, J.1    Zhu, W.T.2    Feng, D.G.3
  • 11
    • 78049329614 scopus 로고    scopus 로고
    • S ecurity enhancement on an improvement on two remote user authentication schemes using smart cards
    • Chen TH, Hsiang HC, Shih WK S ecurity enhancement on an improvement on two remote user authentication schemes using smart cards Future Generation Computer Systems 27 4 2011 377 380
    • (2011) Future Generation Computer Systems , vol.27 , Issue.4 , pp. 377-380
    • Chen, T.H.1    Hsiang, H.C.2    Shih, W.K.3
  • 12
    • 34248666700 scopus 로고    scopus 로고
    • Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
    • Wang XM, Zhang WF, Zhang JS et al. Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards Computer Standards & Interfaces 29 5 2007 507 512
    • (2007) Computer Standards & Interfaces , vol.29 , Issue.5 , pp. 507-512
    • Wang, X.M.1    Zhang, W.F.2    Zhang, J.S.3
  • 15
    • 84949230533 scopus 로고    scopus 로고
    • Key Agreement Protocols and Their Security Analysis
    • Cryptography and Coding
    • Blake-Wilson S, Johnson D, Menezes A Key agreement protocols and their security analysis Proceedings of the 6th IMA International Conference on Cryptography and Coding (IMACC'97), Dec 17-19, 1997, Cirencester, UK. LNCS 1355 1997 Springer-Verlag Berlin, Germany 30 45 (Pubitemid 128005797)
    • (1997) Lecture Notes in Computer Science , Issue.1355 , pp. 30-45
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 16
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • DOI 10.1109/TC.2002.1004593
    • Messerges TS, Dabbish EA, Sloan RH Examining smart-card security under the threat of power analysis attacks IEEE Transactions on Computers 51 5 2002 541 552 (Pubitemid 34550462)
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 18
    • 79959430513 scopus 로고    scopus 로고
    • One for all-all for one: Unifying standard differential power analysis attacks
    • Mangard S, Oswald E, Standaert FX One for all-all for one: unifying standard differential power analysis attacks IET Information Security 5 2 2011 100 110
    • (2011) IET Information Security , vol.5 , Issue.2 , pp. 100-110
    • Mangard, S.1    Oswald, E.2    Standaert, F.X.3
  • 21
    • 41149155794 scopus 로고    scopus 로고
    • Mobile privacy in wireless networks-revisited
    • DOI 10.1109/TWC.2008.060802, 4471983
    • Tang C, Wu D Mobile privacy in wireless networks-revisited IEEE Transactions on Wireless Communications 7 3 2008 1035 1042 (Pubitemid 351436491)
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.3 , pp. 1035-1042
    • Tang, C.1    Wu, D.O.2
  • 22
    • 64249169230 scopus 로고    scopus 로고
    • Weaknesses and improvement of Wang et al's remote user password authentication scheme for resource-limited environments
    • Chung HR, Ku WC, Tsaur MJ Weaknesses and improvement of Wang et al's remote user password authentication scheme for resource-limited environments Computer Standards & Interfaces 31 4 2009 863 868
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.4 , pp. 863-868
    • Chung, H.R.1    Ku, W.C.2    Tsaur, M.J.3
  • 27
    • 33646382089 scopus 로고    scopus 로고
    • A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    • DOI 10.1109/TMC.2006.16
    • Potlapally NR, Ravi S, Raghunathan A et al. A study of the energy consumption characteristics of cryptographic algorithms and security protocols IEEE Transactions on Mobile Computing 5 2 2006 128 143 (Pubitemid 43671073)
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.2 , pp. 128-143
    • Potlapally, N.R.1    Ravi, S.2    Raghunathan, A.3    Jha, N.K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.