Skip to main content

Cryptanalysis and Improvement User Authentication Scheme for Multi-server Environment

  • Conference paper
  • First Online:
Computational Science and Its Applications – ICCSA 2016 (ICCSA 2016)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9790))

Included in the following conference series:

Abstract

Because of increasing mobile devices and networks, people who wanted mobile service can access network at anywhere and anytime. User authentication using smartcard is a one of the widely-spread using technique in which server checks the legitimacy of a user between public channel. Currently, the number of user and server is increasing rapidly, user authentication scheme for multi-server environments have been proposed. User authentication scheme for multi-server environments is built more secure and efficient. As schemes are proposed continuously. In 2016, Amin et al. improved both Sood and Li et al.’s schemes and asserted that their scheme is a more secure and efficient for multi-server environment user authentication scheme. However, we discovered that Amin et al.’s scheme still insecure and not suitable to apply real-life application. In this paper, we demonstrate that their scheme is not able to resist several security threats. Finally, we show that our proposed scheme is more secure and provides for more security features.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Moon, J., et al.: An improvement of robust biometrics-based authentication and key agreement scheme for multi-server environments using smart cards. PloS one 10(12), e0145263 (2015)

    Article  Google Scholar 

  2. Choi, Y., et al.: Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics. Sci. World J. 2014, 1–15 (2014)

    Google Scholar 

  3. Moon, J., et al.: Improvement of biometrics and smart cards-based authentication scheme for multi-server environments. In: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. ACM (2016)

    Google Scholar 

  4. Jeon, W., Lee, Y., Won, D.: An efficient user authentication scheme with smart cards for wireless communications. Int. J. Secur. Appl. 7(4), 1–5 (2013)

    Google Scholar 

  5. Kyungho, S., DongGuk, H., Dongho, W.: A privacy-protecting authentication scheme for roaming services with smart cards. IEICE Trans. Commun. 95(5), 1819–1821 (2012)

    Google Scholar 

  6. Jung, J., et al.: Cryptanalysis and improvement of efficient password-based user authentication scheme using hash function. In: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. ACM (2016)

    Google Scholar 

  7. Ford, W., Kaliski Jr., B.S.: Server-assisted generation of a strong secret from a password. In: Proceedings of the IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, (WET ICE 2000). IEEE (2000)

    Google Scholar 

  8. Jablon, D.P.: Password authentication using multiple servers. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 344–360. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  9. Lin, I.-C., Hwang, M.-S., Li, L.-H.: A new remote user authentication scheme for multi-server architecture. Future Gener. Comput. Syst. 19(1), 13–22 (2003)

    Article  MATH  Google Scholar 

  10. Hu, L., Niu, X., Yang, Y.: An efficient multi-server password authenticated key agreement scheme using smart cards. In: International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. IEEE (2007)

    Google Scholar 

  11. Tsai, J.-L.: Efficient multi-server authentication scheme based on one-way hash function without verification table. Comput. Secur. 27(3), 115–121 (2008)

    Article  Google Scholar 

  12. Liao, Y.-P., Wang, S.-S.: A secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces 31(1), 24–29 (2009)

    Article  Google Scholar 

  13. Li, X., et al.: A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Math. Comput. Model. 58(1), 85–95 (2013)

    Article  Google Scholar 

  14. Xue, K., Hong, P., Ma, C.: A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J. Comput. Syst. Sci. 80(1), 195–206 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  15. Lu, Y., et al.: A lightweight ID based authentication, key agreement protocol for multiserver architecture. Int. J. Distrib. Sens. Netw. 2015, 16 (2015)

    Google Scholar 

  16. Amin, R.: Cryptanalysis, efficient dynamic ID based remote user authentication scheme in multi-server environment using smart card. Int. J. Netw. Secur. 18(1), 172–181

    Google Scholar 

  17. Sood, S.K.: Dynamic identity based authentication protocol for two-server architecture. J. Inf. Secur. 3(04), 326 (2012)

    Google Scholar 

  18. Li, C.-T., Weng, C.Y., Fan, C.I.: Two-factor user authentication in multi-server networks. Int. J. Secur. Appl. 6(2), 261–267 (2012)

    Google Scholar 

  19. Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  20. Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541–552 (2002)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This work was supported by Institute for Information and communications Technology Promotion(IITP)grant funded by the Korea government(MSIP)(No.R0126-15-1111, The Development of Risk-based Authentication Access Control Platform and Compliance Technique for Cloud Security).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dongho Won .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Kang, D., Moon, J., Lee, D., Won, D. (2016). Cryptanalysis and Improvement User Authentication Scheme for Multi-server Environment. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2016. ICCSA 2016. Lecture Notes in Computer Science(), vol 9790. Springer, Cham. https://doi.org/10.1007/978-3-319-42092-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-42092-9_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-42091-2

  • Online ISBN: 978-3-319-42092-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics