메뉴 건너뛰기




Volumn 27, Issue 10, 2014, Pages 2215-2227

Security flaws in two improved remote user authentication schemes using smart cards

Author keywords

Authentication protocol; Cryptanalysis; Dynamic ID; Nontamper resistant; Offline password guessing attack; Smart card

Indexed keywords

CRYPTOGRAPHY; DENIAL-OF-SERVICE ATTACK; ECONOMIC AND SOCIAL EFFECTS; SMART CARDS;

EID: 84911988880     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.2468     Document Type: Article
Times cited : (168)

References (49)
  • 1
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport L. Password authentication with insecure communication. Communications of the ACM 1981; 24(11):770-772.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 3
    • 52949137008 scopus 로고    scopus 로고
    • Two-factor mutual authentication based on smart cards and passwords
    • Yang G, Wong D, Wang H, Deng X. Two-factor mutual authentication based on smart cards and passwords. Journal of Computer and System Sciences 2008; 74(7):1160-1172.
    • (2008) Journal of Computer and System Sciences , vol.74 , Issue.7 , pp. 1160-1172
    • Yang, G.1    Wong, D.2    Wang, H.3    Deng, X.4
  • 4
    • 59649083248 scopus 로고    scopus 로고
    • A more efficient and secure dynamic ID-based remote user authentication scheme
    • Wang Y, Liu J, Xiao F, Dan J. A more efficient and secure dynamic ID-based remote user authentication scheme. Computer Communications 2009; 32(4):583-585.
    • (2009) Computer Communications , vol.32 , Issue.4 , pp. 583-585
    • Wang, Y.1    Liu, J.2    Xiao, F.3    Dan, J.4
  • 5
    • 77955133201 scopus 로고    scopus 로고
    • A secure remote authentication scheme preserving user anonymity with non-tamper resistant smart cards
    • Horng W, Lee C, Peng J. A secure remote authentication scheme preserving user anonymity with non-tamper resistant smart cards. WSEAS Transactions on Information Science and Applications 2010; 7(5):619-628.
    • (2010) WSEAS Transactions on Information Science and Applications , vol.7 , Issue.5 , pp. 619-628
    • Horng, W.1    Lee, C.2    Peng, J.3
  • 6
    • 78049322666 scopus 로고    scopus 로고
    • Two robust remote user authentication protocols using smart cards
    • Yeh KH, Su C, Lo NW, Li Y, Hung YX. Two robust remote user authentication protocols using smart cards. Journal of Systems and Software 2010; 83(12):2556-2565.
    • (2010) Journal of Systems and Software , vol.83 , Issue.12 , pp. 2556-2565
    • Yeh, K.H.1    Su, C.2    Lo, N.W.3    Li, Y.4    Hung, Y.X.5
  • 8
    • 78751642788 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of a more efficient and secure dynamic ID-based remote user authentication scheme'
    • Khan M, Kim S, Alghathbar K. Cryptanalysis and security enhancement of a more efficient and secure dynamic ID-based remote user authentication scheme'. Computer Communications 2011; 34(3):305-309.
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 305-309
    • Khan, M.1    Kim, S.2    Alghathbar, K.3
  • 9
    • 79956361026 scopus 로고    scopus 로고
    • Secure dynamic identity-based authentication scheme using smart cards
    • Sood SK. Secure dynamic identity-based authentication scheme using smart cards. Information Security Journal: A Global Perspective 2011; 20(2):67-77.
    • (2011) Information Security Journal: A Global Perspective , vol.20 , Issue.2 , pp. 67-77
    • Sood, S.K.1
  • 10
    • 84863239521 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of Sood et al.'s dynamic ID-based authentication scheme
    • Ramanujam R, Ramaswamy S (eds), LNCS. Springer: Berlin/Heidelberg
    • Ma CG, Wang D, Zhang QM. Cryptanalysis and improvement of Sood et al.'s dynamic ID-based authentication scheme. In ICDCIT 2012, Vol. 7154, Ramanujam R, Ramaswamy S (eds), LNCS. Springer: Berlin/Heidelberg, 2012; 141-152.
    • (2012) ICDCIT 2012 , vol.7154 , pp. 141-152
    • Ma, C.G.1    Wang, D.2    Zhang, Q.M.3
  • 11
    • 84868139535 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards
    • Wang D, Ma CG. Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards. The Journal of China Universities of Posts and Telecommunications 2012; 19(5):104-114.
    • (2012) The Journal of China Universities of Posts and Telecommunications , vol.19 , Issue.5 , pp. 104-114
    • Wang, D.1    Ma, C.G.2
  • 12
    • 84863056589 scopus 로고    scopus 로고
    • Robust smart-cards-based user authentication scheme with user anonymity
    • Wu SH, Zhu YF, Pu Q. Robust smart-cards-based user authentication scheme with user anonymity. Security and Communication Networks 2012; 5(2):236-248.
    • (2012) Security and Communication Networks , vol.5 , Issue.2 , pp. 236-248
    • Wu, S.H.1    Zhu, Y.F.2    Pu, Q.3
  • 13
    • 84864344507 scopus 로고    scopus 로고
    • Secure password-based remote user authentication scheme with non-tamper resistant smart cards
    • Cuppens-Boulahia N, Cuppens F, Garcia-Alfaro J (eds), LNCS Springer: Berlin/Heidelberg
    • Wang D, Ma CG, Wu P. Secure password-based remote user authentication scheme with non-tamper resistant smart cards. In 26th Annual IFIP Conference on Data and Applications Security and Privacy (DBSEC 2012), Vol. 7371, Cuppens-Boulahia N, Cuppens F, Garcia-Alfaro J (eds), LNCS. Springer: Berlin/Heidelberg, 2012; 114-121.
    • (2012) 26th Annual IFIP Conference on Data and Applications Security and Privacy (DBSEC 2012) , vol.7371 , pp. 114-121
    • Wang, D.1    Ma, C.G.2    Wu, P.3
  • 14
    • 40949152760 scopus 로고    scopus 로고
    • Password authentication schemes: Current status and key issues
    • Tsai C, Lee C, Hwang M. Password authentication schemes: current status and key issues. International Journal of Network Security 2006; 3(2):101-115.
    • (2006) International Journal of Network Security , vol.3 , Issue.2 , pp. 101-115
    • Tsai, C.1    Lee, C.2    Hwang, M.3
  • 15
    • 84901208308 scopus 로고    scopus 로고
    • Robust smart card based password authentication scheme against smart card security breach
    • [Accessed on 21 July 2012]
    • Wang D, Ma CG. Robust smart card based password authentication scheme against smart card security breach. Cryptology ePrint Archive. Report 2012/439, 2012. (Available from: http://eprint.iacr.org/2012/439.pdf). [Accessed on 21 July 2012].
    • (2012) Cryptology EPrint Archive. Report 2012/439
    • Wang, D.1    Ma, C.G.2
  • 16
    • 64249125305 scopus 로고    scopus 로고
    • An improved smart card based password authentication scheme with provable security
    • Xu J, Zhu W, Feng D. An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces 2009; 31(4):723-728.
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.4 , pp. 723-728
    • Xu, J.1    Zhu, W.2    Feng, D.3
  • 17
    • 0000474763 scopus 로고    scopus 로고
    • Differential power analysis
    • LNCS Springer: Berlin/Heidelberg
    • Kocher P, Jaffe J, Jun B. Differential power analysis. In Advances in Cryptology-CRYPTO 1999, Vol. 1666, LNCS. Springer: Berlin/Heidelberg, 1999; 789-789.
    • (1999) Advances in Cryptology-CRYPTO 1999 , vol.1666 , pp. 789-789
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 18
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges TS, Dabbish EA, Sloan RH. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51(5):541-552.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 19
    • 84856099707 scopus 로고    scopus 로고
    • Side-channel analysis of cryptographic rfids with analog demodulation
    • Juels A, Paar C (eds), LNCS Springer: Berlin/Heidelberg
    • Kasper T, Oswald D, Paar C. Side-channel analysis of cryptographic rfids with analog demodulation. In RFIDSEC 2012, Vol. 7055, Juels A, Paar C (eds), LNCS. Springer: Berlin/Heidelberg, 2012; 61-77.
    • (2012) RFIDSEC 2012 , vol.7055 , pp. 61-77
    • Kasper, T.1    Oswald, D.2    Paar, C.3
  • 20
    • 77955312905 scopus 로고    scopus 로고
    • Advanced smart card based password authentication protocol
    • Song R. Advanced smart card based password authentication protocol. Computer Standards & Interfaces 2010; 32(5):321-325.
    • (2010) Computer Standards & Interfaces , vol.32 , Issue.5 , pp. 321-325
    • Song, R.1
  • 22
    • 84858082073 scopus 로고    scopus 로고
    • An improved dynamic ID-based remote user authentication with key agreement scheme
    • Wen F, Li X. An improved dynamic ID-based remote user authentication with key agreement scheme. Computers & Electrical Engineering 2012; 38(2):381-387.
    • (2012) Computers & Electrical Engineering , vol.38 , Issue.2 , pp. 381-387
    • Wen, F.1    Li, X.2
  • 24
    • 43649083106 scopus 로고    scopus 로고
    • Cryptanalysis of a password authentication scheme over insecure networks
    • Xiang T, Wong K, Liao X. Cryptanalysis of a password authentication scheme over insecure networks. Journal of Computer and system Sciences 2008; 74(5):657-661.
    • (2008) Journal of Computer and System Sciences , vol.74 , Issue.5 , pp. 657-661
    • Xiang, T.1    Wong, K.2    Liao, X.3
  • 25
    • 84911986679 scopus 로고    scopus 로고
    • Cryptanalysis of song's advanced smart card based password authentication protocol
    • abs/1111.2744
    • Tapiador JE, Hernandez-Castro JC, Peris-Lopez P, Clark JA. Cryptanalysis of song's advanced smart card based password authentication protocol. CoRR 2011; abs/1111.2744.
    • (2011) CoRR
    • Tapiador, J.E.1    Hernandez-Castro, J.C.2    Peris-Lopez, P.3    Clark, J.A.4
  • 26
    • 84858112506 scopus 로고    scopus 로고
    • Security flaws in three password-based remote user authentication schemes with smart cards
    • Shim K. Security flaws in three password-based remote user authentication schemes with smart cards. Cryptologia 2012; 36(1):62-69.
    • (2012) Cryptologia , vol.36 , Issue.1 , pp. 62-69
    • Shim, K.1
  • 27
    • 84876151110 scopus 로고    scopus 로고
    • Security flaws in a smart card based authentication scheme for multi-server environment
    • He D, Wu S. Security flaws in a smart card based authentication scheme for multi-server environment. Wireless Personal Communications 2012. DOI: 10.1007/s11277-012-0696-1.
    • (2012) Wireless Personal Communications
    • He, D.1    Wu, S.2
  • 28
    • 79959763451 scopus 로고    scopus 로고
    • Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture
    • Yeh K, Lo N, Li Y. Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture. International Journal of Communication Systems 2011; 24(7):829-836.
    • (2011) International Journal of Communication Systems , vol.24 , Issue.7 , pp. 829-836
    • Yeh, K.1    Lo, N.2    Li, Y.3
  • 29
    • 84860614830 scopus 로고    scopus 로고
    • A new dynamic ID-based remote user authentication scheme with forward secrecy
    • Wang H, Zou L, Huang G, He J, Pang C, Zhang H, Zhao D, Yi Z (eds), LNCS Springer: Berlin/Heidelberg
    • Ma CG, Wang D, Zhao P, Wang YH. A new dynamic ID-based remote user authentication scheme with forward secrecy. In APWeb'12, Vol. 7234, Wang H, Zou L, Huang G, He J, Pang C, Zhang H, Zhao D, Yi Z (eds), LNCS. Springer: Berlin/Heidelberg, 2012; 199-211.
    • (2012) APWeb'12 , vol.7234 , pp. 199-211
    • Ma, C.G.1    Wang, D.2    Zhao, P.3    Wang, Y.H.4
  • 30
    • 84871579251 scopus 로고    scopus 로고
    • Cryptanalysis of two dynamic id-based remote user authentication schemes for multi-server architecture
    • Xu L, Bertino E, Mu Y (eds), LNCS Springer: Berlin/Heidelberg
    • Wang D, Ma CG, Zhao S, Zhou C. Cryptanalysis of two dynamic id-based remote user authentication schemes for multi-server architecture. In Proceedingg of 6th International Conference on Network and System Security (NSS 2012), Vol. 7645, Xu L, Bertino E, Mu Y (eds), LNCS. Springer: Berlin/Heidelberg, 2012; 462-475.
    • (2012) Proceedingg of 6th International Conference on Network and System Security (NSS 2012) , vol.7645 , pp. 462-475
    • Wang, D.1    Ma, C.G.2    Zhao, S.3    Zhou, C.4
  • 31
    • 84871602807 scopus 로고    scopus 로고
    • Secure password-based remote user authentication scheme with non-tamper resistant smart cards
    • Park JJ (ed.), LNCS Springer: Berlin/Heidelberg
    • Wang D, Ma CG, Zhao S, Zhou C. Secure password-based remote user authentication scheme with non-tamper resistant smart cards. In 9th IFIP International Conference on Network and Parallel Computing (NPC 2012), Vol. 7513, Park JJ (ed.), LNCS. Springer: Berlin/Heidelberg, 2012; 110-118.
    • (2012) 9th IFIP International Conference on Network and Parallel Computing (NPC 2012) , vol.7513 , pp. 110-118
    • Wang, D.1    Ma, C.G.2    Zhao, S.3    Zhou, C.4
  • 33
    • 0040231044 scopus 로고
    • Foiling the cracker: A survey of, and improvements to, password security
    • Anaheim, CA, USA. Berkeley, CA, USA: USENIX Association, August
    • Klein DV. Foiling the cracker: a survey of, and improvements to, password security. Proceedings of the 2nd USENIX Security Workshop, Anaheim, CA, USA. Berkeley, CA, USA: USENIX Association, August 1990; 5-14.
    • (1990) Proceedings of the 2nd USENIX Security Workshop , pp. 5-14
    • Klein, D.V.1
  • 35
    • 84957019437 scopus 로고    scopus 로고
    • Privacy protection for transactions of digital goods
    • Qing S, Okamoto T, Zhou J (eds), LNCS Springer: Berlin/Heidelberg
    • Bao F, Deng R. Privacy protection for transactions of digital goods. In ICICS 2001, Vol. 2229, Qing S, Okamoto T, Zhou J (eds), LNCS. Springer: Berlin/Heidelberg, 2001; 202-213.
    • (2001) ICICS 2001 , vol.2229 , pp. 202-213
    • Bao, F.1    Deng, R.2
  • 36
    • 41149155794 scopus 로고    scopus 로고
    • Mobile privacy in wireless networks-revisited
    • March
    • Tang C, Wu D. Mobile privacy in wireless networks-revisited. IEEE Transactions on Wireless Communications March 2008; 7(3):1035-1042.
    • (2008) IEEE Transactions on Wireless Communications , vol.7 , Issue.3 , pp. 1035-1042
    • Tang, C.1    Wu, D.2
  • 38
    • 84911986325 scopus 로고    scopus 로고
    • A real-world analysis of kerberos password security
    • San Diego, CA, USA, March
    • Wu T. A real-world analysis of kerberos password security. Proceedings of NDSS'99, Internet Soc., San Diego, CA, USA, March 1998; 1-14.
    • (1998) Proceedings of NDSS'99, Internet Soc , pp. 1-14
    • Wu, T.1
  • 39
  • 40
    • 84856217617 scopus 로고    scopus 로고
    • An enhanced and security dynamic identity based authentication protocol for multi-server architecture using smart cards
    • Li X, Xiong Y, Ma J, Wang W. An enhanced and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications 2012; 35(2):763-769.
    • (2012) Journal of Network and Computer Applications , vol.35 , Issue.2 , pp. 763-769
    • Li, X.1    Xiong, Y.2    Ma, J.3    Wang, W.4
  • 41
    • 78751645363 scopus 로고    scopus 로고
    • Robust authentication and key agreement scheme preserving the privacy of secret key
    • Wang RC, Juang WS, Lei CL. Robust authentication and key agreement scheme preserving the privacy of secret key. Computer Communications 2011; 34(3):274-280.
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 274-280
    • Wang, R.C.1    Juang, W.S.2    Lei, C.L.3
  • 44
    • 79251600218 scopus 로고    scopus 로고
    • A secure dynamic identity based authentication protocol for multi-server architecture
    • Sood S, Sarje A, Singh K. A secure dynamic identity based authentication protocol for multi-server architecture. Journal of Network and Computer Applications 2011; 34(2):609-618.
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.2 , pp. 609-618
    • Sood, S.1    Sarje, A.2    Singh, K.3
  • 46
    • 75449106985 scopus 로고    scopus 로고
    • Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
    • Li X, Qiu W, Zheng D, Chen K, Li J. Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics 2010; 57(2):793-800.
    • (2010) IEEE Transactions on Industrial Electronics , vol.57 , Issue.2 , pp. 793-800
    • Li, X.1    Qiu, W.2    Zheng, D.3    Chen, K.4    Li, J.5
  • 47
    • 78049329614 scopus 로고    scopus 로고
    • Security enhancement on an improvement on two remote user authentication schemes using smart cards
    • Chen T, Hsiang H, Shih W. Security enhancement on an improvement on two remote user authentication schemes using smart cards. Future Generation Computer Systems 2011; 27(4):377-380.
    • (2011) Future Generation Computer Systems , vol.27 , Issue.4 , pp. 377-380
    • Chen, T.1    Hsiang, H.2    Shih, W.3
  • 48
    • 84957794888 scopus 로고    scopus 로고
    • Forward secrecy and its application to future mobile communications security
    • Imai H, Zheng Y (eds), LNCS Springer: Berlin/Heidelberg
    • Park D, Boyd C, Moon SJ. Forward secrecy and its application to future mobile communications security. In PKC 2000, Vol. 1751, Imai H, Zheng Y (eds), LNCS. Springer: Berlin/Heidelberg, 2000; 433-445.
    • (2000) PKC 2000 , vol.1751 , pp. 433-445
    • Park, D.1    Boyd, C.2    Moon, S.J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.