메뉴 건너뛰기




Volumn 8, Issue 1, 2013, Pages 148-155

Secure password-based remote user authentication scheme against smart card security breach

Author keywords

Authentication protocol; Cryptanalysis; Network security; Non tamper resistant; Smart card; User anonymity

Indexed keywords

AUTHENTICATION PROTOCOLS; CRYPTANALYSIS; DENIAL OF SERVICE ATTACKS; DIFFERENT PASSWORD AUTHENTICATION; FORWARD SECRECY; IMPROVED SCHEME; NON-TAMPER RESISTANTS; OFFLINE PASSWORD GUESSING ATTACK; PASSWORD AUTHENTICATION PROTOCOLS; REMOTE USER AUTHENTICATION SCHEMES; SECURITY THREATS; SMART CARD SECURITY; USER ANONYMITY; VARIOUS ATTACKS;

EID: 84874023543     PISSN: 17962056     EISSN: None     Source Type: Journal    
DOI: 10.4304/jnw.8.1.148-155     Document Type: Article
Times cited : (20)

References (29)
  • 1
    • 0026153410 scopus 로고
    • Remote password authentication with smart cards
    • C.C. Chang and T.C. Wu, "Remote password authentication with smart cards," IEE Proceedings-E, vol. 138, no. 3, pp. 165-168, 1993.
    • (1993) IEE Proceedings-E , vol.138 , Issue.3 , pp. 165-168
    • Chang, C.C.1    Wu, T.C.2
  • 2
    • 1942423677 scopus 로고    scopus 로고
    • Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
    • W.C. Ku and S.M. Chen, "Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp. 204-207, 2004.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 204-207
    • Ku, W.C.1    Chen, S.M.2
  • 3
    • 33748126252 scopus 로고    scopus 로고
    • A password authentication scheme over insecure networks
    • I.E. Liao, C.C. Lee, and M.S. Hwang, "A password authentication scheme over insecure networks," Journal of Computer and System Sciences, vol. 72, no. 4, pp. 727-740, 2006.
    • (2006) Journal of Computer and System Sciences , vol.72 , Issue.4 , pp. 727-740
    • Liao, I.E.1    Lee, C.C.2    Hwang, M.S.3
  • 4
    • 84862930748 scopus 로고    scopus 로고
    • Improvements on two password-based authentication protocols
    • Technical report 561
    • Y. Chen, J.S. Chou, and C.H. Huang, "Improvements on two password-based authentication protocols," Cryptology ePrint archive, Technical report 561, 2010.
    • (2010) Cryptology EPrint Archive
    • Chen, Y.1    Chou, J.S.2    Huang, C.H.3
  • 5
    • 77955133201 scopus 로고    scopus 로고
    • A secure remote authentication scheme preserving user anonymity with non-tamper resistant smart cards
    • W.B. Horng, C.P. Lee, and J. Peng, "A secure remote authentication scheme preserving user anonymity with non-tamper resistant smart cards," WSEAS Transactions on Information Science and Applications, vol. 7, no. 5, pp. 619-628, 2010.
    • (2010) WSEAS Transactions on Information Science and Applications , vol.7 , Issue.5 , pp. 619-628
    • Horng, W.B.1    Lee, C.P.2    Peng, J.3
  • 6
    • 64249125305 scopus 로고    scopus 로고
    • An improved smart card based password authentication scheme with provable security
    • J. Xu, W.T. Zhu, and D.G. Feng, "An improved smart card based password authentication scheme with provable security," Computer Standards & Interfaces, vol. 31, no. 4, pp. 723-728, 2009.
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.4 , pp. 723-728
    • Xu, J.1    Zhu, W.T.2    Feng, D.G.3
  • 7
    • 79956361026 scopus 로고    scopus 로고
    • Secure Dynamic Identity-Based Authentication Scheme Using Smart Cards
    • S.K. Sood, "Secure Dynamic Identity-Based Authentication Scheme Using Smart Cards," Information Security Journal: A Global Perspective, vol. 20, no. 2, pp. 67-77, 2011.
    • (2011) Information Security Journal: A Global Perspective , vol.20 , Issue.2 , pp. 67-77
    • Sood, S.K.1
  • 10
    • 0036566408 scopus 로고    scopus 로고
    • Examining Smart-Card Security under the Threat of Power Analysis Attacks
    • T.S. Messerges, E.A. Dabbish, and R.H. Sloan, "Examining Smart-Card Security under the Threat of Power Analysis Attacks," IEEE Transactions on Computers, vol. 51, no. 5, pp. 541-552, 2002.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 12
    • 33745179557 scopus 로고    scopus 로고
    • HMQV: A High-Performance Secure Diffie-Hellman Protocol
    • H. Krawczyk, "HMQV: A High-Performance Secure Diffie-Hellman Protocol," in proceedings of CRYPTO'05, LNCS, vol. 3621, 2005, pp. 546-566.
    • (2005) Proceedings of CRYPTO'05, LNCS , vol.3621 , pp. 546-566
    • Krawczyk, H.1
  • 13
    • 78751645363 scopus 로고    scopus 로고
    • Robust authentication and key agreement scheme preserving the privacy of secret key
    • R.C. Wang, W.S. Juang, and C.L. Lei, "Robust authentication and key agreement scheme preserving the privacy of secret key," Computer Communications, vol. 34, no. 3, pp. 274-280, 2011.
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 274-280
    • Wang, R.C.1    Juang, W.S.2    Lei, C.L.3
  • 14
    • 84863056589 scopus 로고    scopus 로고
    • Robust smart-cards-based user authentication scheme with user anonymity
    • S.H. Wu, Y.F. Zhu, and Q. Pu, "Robust smart-cards-based user authentication scheme with user anonymity," Security and Communication Networks, vol. 5, no. 2, pp. 236-248, 2012.
    • (2012) Security and Communication Networks , vol.5 , Issue.2 , pp. 236-248
    • Wu, S.H.1    Zhu, Y.F.2    Pu, Q.3
  • 16
    • 4043152192 scopus 로고    scopus 로고
    • Further improvement of an efficient password based remote user authentication scheme using smart cards
    • E.J. Yoon, E.K. Ryu, K.Y. Yoo, "Further improvement of an efficient password based remote user authentication scheme using smart cards", IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 612-614, 2004.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.2 , pp. 612-614
    • Yoon, E.J.1    Ryu, E.K.2    Yoo, K.Y.3
  • 17
    • 59649086399 scopus 로고    scopus 로고
    • Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards
    • H. C. Hsiang and W. K. Shih, "Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards," Computer Communications, vol. 32, no. 4, pp. 649-652, 2009.
    • (2009) Computer Communications , vol.32 , Issue.4 , pp. 649-652
    • Hsiang, H.C.1    Shih, W.K.2
  • 18
    • 80053379375 scopus 로고    scopus 로고
    • A Robust Remote User Authentication Scheme using Smart Card
    • C.T. Li and C.C. Lee, "A Robust Remote User Authentication Scheme using Smart Card," Information Technology and Control, vol. 40, no. 3, pp. 231-238, 2011.
    • (2011) Information Technology and Control , vol.40 , Issue.3 , pp. 231-238
    • Li, C.T.1    Lee, C.C.2
  • 19
    • 0040231044 scopus 로고
    • Foiling the Cracker: A Survey of, and Improvements to, Password Security
    • D.V. Klein, "Foiling the Cracker: A Survey of, and Improvements to, Password Security," in proceedings of 2nd USENIX Security Workshop, 1990, pp. 5-14.
    • (1990) Proceedings of 2nd USENIX Security Workshop , pp. 5-14
    • Klein, D.V.1
  • 20
    • 0003370741 scopus 로고
    • A security risk of depending on synchronized clocks
    • L. Gong, "A security risk of depending on synchronized clocks," ACM Operating System Review, vol. 26, no. 1, pp. 49-53, 1992.
    • (1992) ACM Operating System Review , vol.26 , Issue.1 , pp. 49-53
    • Gong, L.1
  • 21
    • 78751648745 scopus 로고    scopus 로고
    • A strong user authentication scheme with smart cards for wireless communications
    • D. He, M. Ma, Y. Zhang, and C. Chen, "A strong user authentication scheme with smart cards for wireless communications," Computer Communications, vol. 34, no. 3, pp. 367-374, 2011.
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 367-374
    • He, D.1    Ma, M.2    Zhang, Y.3    Chen, C.4
  • 23
    • 84868139535 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of a remote user authentication scheme
    • D. Wang and C.G. Ma, "Cryptanalysis and security enhancement of a remote user authentication scheme", The Journal of China Universities of Posts and Telecommunications, vol. 19, no. 5, pp.104-114, 2012
    • (2012) The Journal of China Universities of Posts and Telecommunications , vol.19 , Issue.5 , pp. 104-114
    • Wang, D.1    Ma, C.G.2
  • 24
    • 64249169230 scopus 로고    scopus 로고
    • Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments
    • H.R. Chung, W.C. Ku, and M.J. Tsaur, "Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments," Computer Standards & Interfaces, vol. 31, no. 4, pp. 863-868, 2009.
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.4 , pp. 863-868
    • Chung, H.R.1    Ku, W.C.2    Tsaur, M.J.3
  • 26
    • 84949187399 scopus 로고    scopus 로고
    • The Performance Measurement of Cryptographic Primitives on Palm Devices
    • D.S. Wong, H.H. Fuentes, and A.H. Chan, "The Performance Measurement of Cryptographic Primitives on Palm Devices," in Proceedings of ACSAC'01, pp. 92-101, 2001.
    • (2001) Proceedings of ACSAC'01 , pp. 92-101
    • Wong, D.S.1    Fuentes, H.H.2    Chan, A.H.3
  • 27
    • 33646382089 scopus 로고    scopus 로고
    • A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    • N.R. Potlapally, S. Ravi, A. Raghunathan, and N.K. Jha, "A study of the energy consumption characteristics of cryptographic algorithms and security protocols," IEEE Transactions on Mobile Computing, vol.5, no. 2, pp. 128-143, 2006.
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.2 , pp. 128-143
    • Potlapally, N.R.1    Ravi, S.2    Raghunathan, A.3    Jha, N.K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.