Skip to main content

A Geometric-Based User Authentication Scheme for Multi-server Architecture: Cryptanalysis and Enhancement

  • Conference paper
  • First Online:
Proceedings of the Sixth International Conference on Mathematics and Computing

Abstract

An authentication system provides such an environment by which remote server can easily verify the authorized remote users over a public communication channel like the Internet. In this regard, Lin et al. proposed a timestamp-based remote user authentication scheme based on the geometric properties on the Euclidean plane for multi-server architecture. Unfortunately, we show in this paper that Lin et al.’s scheme has some security weaknesses. Furthermore, we propose an improvement of Lin et al.’s scheme to withstand their issues. Our improved scheme is analyzed and it shows that the proposed scheme can protect various security attacks. This work also compares the proposed scheme with the related schemes to check the efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lin IC, Hwang MS, Li LH (2003) A new remote user authentication scheme for multi-server architecture. Future Gener Comput Syst 19:13–22

    Article  Google Scholar 

  2. Lamport L (1981) Password authentication with insecure communication. Commun ACM 24:770–772

    Article  Google Scholar 

  3. Hwang MS, Li L (2000) A new remote user authentication scheme using smart cards. IEEE Trans Consum Electron 46(1):28–30

    Article  Google Scholar 

  4. Chien HY, Jan JK, Tseng YM (2002) An efficient and practical solution to remote authentication: smart card. Comput Secur 21(4):372–375

    Article  Google Scholar 

  5. Kim KW, Jeon JC, Yoo KY (2005) An improvement on yang et al.’s password authentication schemes. Appl Math Comput 170:207–215

    Google Scholar 

  6. Shen JJ, Lin CW, Hwang MS (2003) Security enhancement for the timestamp-based password authentication scheme using smart cards. Comput Secur 22(7):591–595

    Article  Google Scholar 

  7. Yoon EJ, Ryu EK, Yoo KY (2004) Efficient remote user authentication scheme based on generalized elgamal signature scheme. IEEE Trans Consum Electron 50(2):568–570

    Article  Google Scholar 

  8. Li LH, Lin IC, Hwang MS (2001) A remote password authentication scheme for multi-server architecture using neural networks. IEEE Trans Neural Netw 12(6):1498–1504

    Article  Google Scholar 

  9. Amin R, Maitra T, Giri D (2013) Article: an improved efficient remote user authentication scheme in multi-server environment using smart card. Int J Comput Appl 69(22):1–6

    Google Scholar 

  10. Giri D, Sherratt RS, Maitra T (2016) A novel and efficient session spanning biometric and password based three-factor authentication protocol for consumer usb mass storage devices. IEEE Trans Consum Electron 62(3):283–291

    Article  Google Scholar 

  11. Maitra T, Giri D (2014) An efficient biometric and password-based remote user authentication using smart card for telecare medical information systems in multi-server environment. J Med Syst 38(12):142

    Google Scholar 

  12. Maitra T, Islam SH, Amin R, Giri D, Khan MK, Kumar N (2016) An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design. Secur Commun Netw 9(17):4615–4638

    Article  Google Scholar 

  13. NIST: Secure hash standard (1995) Federal Information Processing Standard. FIPS-180-1

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tanmoy Maitra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Giri, D., Maitra, T. (2021). A Geometric-Based User Authentication Scheme for Multi-server Architecture: Cryptanalysis and Enhancement. In: Giri, D., Buyya, R., Ponnusamy, S., De, D., Adamatzky, A., Abawajy, J.H. (eds) Proceedings of the Sixth International Conference on Mathematics and Computing. Advances in Intelligent Systems and Computing, vol 1262. Springer, Singapore. https://doi.org/10.1007/978-981-15-8061-1_2

Download citation

Publish with us

Policies and ethics