Abstract
In 2010, Sood et al [16] proposed a secure dynamic identity based authentication scheme using smart cards. They claimed that their scheme is secure against various attacks. In this paper, we demonstrate that their scheme is completely insecure and vulnerable to outsider attack as well as insider attack. An outsider attacker can obtain the common session key between the user and the server, while an insider attacker can get not only the session key but also the secret key of the server. Therefore, the entire system collapses. To remedy these security flaws, an improved scheme is proposed to withstand these attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Awasthi, A.K.: Comment on a dynamic id-based remote user authentication scheme. Transaction on Cryptology 1(2), 15–16 (2004)
Chien, H.-Y., Chen, C.H.: A remote authentication scheme preserving user anonymity. Proc. Advanced Information Networking and Applications 2, 245–248 (2005)
Chien, H.-Y., Jan, J.-K., Tseng, Y.-M.: An efficient and practical solution to remote authentication: smart card. Computers and Security 21(4), 372–375 (2002)
Das, M.L., Saxena, A., Gulati, V.P.: A dynamic id-based remote user authentication scheme. IEEE Transactions on Consumer Electronics 50(2), 629–631 (2004)
He, D., Wu, S.: Security flaws in smart card based authentication scheme for multi server environment. Wireless Personal Communications (2012) (0929-6212)
Hwang, M.-S., Li, L.H.: A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46(1), 28–30 (2000)
Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Ku, W.-C., Chang, S.-T.: Impersonation attack on dynamic id-based remote user authentication scheme using smart cards. IEICE, Transactions on Communications E88-B(5), 2165–2167 (2005)
Lamport, L.: Password authentication with insecure communication. Communication of the ACM 24(11), 770–772 (1981)
Liao, I.-E., Lee, C.-C., Hwang, M.-S.: Security enhancement for a dynamic id-based remote user authentication scheme. Proc. Conference on Next Generation Web Services Practice, 437–440 (2005)
Liou, Y., Lin, J., Wang, S.: A new dynamic id-based remote user authentication scheme using smart cards. In: Proc. 16th Information Security Conference, Taiwan, pp. 198–205 (July 2006)
Liu, J., Zhong, S.: Analysis of kim-jeon-yoo password authentication scheme. Cryptologia 33(2), 183–187 (2009)
Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart card security under the threat of power analysis attacks. IEEE Transactions on Computers 51(5), 541–552 (2002)
Pelaez, R.M., Novella, F.R.: Cryptanalysis of sood et al’s authentication scheme using smart cards. IACR Cryptology ePrint Archive (386) (July 2012)
Snih, H.C.: Cryptanalysis on two password authentication schemes. In: Labortary of Cryptography and Information Security. National Central University, Taiwan (2008)
Sood, S.K., Sarje, A.K., Singh, K.: An improvement of liao et al’s authentication scheme using smard cards. In: Proc. IEEE 2nd International Advance Computing Conference, pp. 240–245 (February 2010)
Yoon, E.-J., Yoo, K.-Y.: Improving the dynamic ID-based remote mutual authentication scheme. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 499–507. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Kaul, S.D., Awasthi, A.K. (2013). Analysis and Improvement of an Authentication Scheme Using Smart Cards. In: Singh, K., Awasthi, A.K. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37949-9_63
Download citation
DOI: https://doi.org/10.1007/978-3-642-37949-9_63
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37948-2
Online ISBN: 978-3-642-37949-9
eBook Packages: Computer ScienceComputer Science (R0)