Skip to main content
Log in

Mutual authentications to parties with QR-code applications in mobile systems

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

User authentication over the Internet has long been an issue for Internet service providers and users. A good authentication protocol must provide high security and mutual authentication on both sides. In addition, it must balance security and usability, which has been shown in the literature to be a difficult problem. To solve this problem, we propose a novel mutual authentication protocol with high security and usability. The proposed protocol was developed for quick response code, a type of two-dimensional barcode that can be photographed and quickly decoded by smartphones. We implemented a prototype using the proposed mutual authentication protocol and demonstrated how the prototype improves usability in a mobile communication system. We also used the Gong–Needham–Yahalom logic with several well-known attack models to analyze the security of the proposed protocol, and we obtained satisfactory results. We expect that using the proposed protocol, Internet service providers will be able to provide a mutual authentication mechanism with high security and usability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Park, D., Boyd, C., Dawson, E.: Classification of authentication protocols: a practical approach. In: The 3rd International Workshop, ISW 2000 Wollongong, Australia. Lecture Notes in Computer Science, vol 1975, Springer, Berlin, pp. 194–208 (2000)

  2. Kieseberg, P., Leithner, M., Mulazzani, M., Munroe, L., Schrittwieser, S., Sinha, M., Weippl, E.: QR code security. In: The 8th International Conference on Advances in Mobile Computing and Multimedia (MoMM’10), ACM-proceedings, pp. 430–435 (2010)

  3. Oh, D.S., Kim, B.H., Lee, J.K.: A study on authentication system using QR code for mobile cloud computing environment. In: The 6th International Conference on FutureTech 2011, Loutraki, Greece. Communications in Computer and Information Science, vol. 184, Springer-Verlag GmbH, Berlin, pp. 500–507 (2011)

  4. Liao, K.C., Lee, W.H.: A novel user authentication scheme based on QR-code. Journal of Networks 5(8), 937–941 (2010)

    Article  Google Scholar 

  5. Liao, K.C., Lee, W.H., Sung, M.H., Lin, T.C.: A one-time password scheme with QR-code based on mobile phone, IEEE-Proceedings, The 5th International Joint Conference on Networked Computing and Advanced Information Management (NCM’09), pp. 2069–2071 (2009)

  6. Sahu, S.K., Gonnade, S.K.: Encryption in QR code using steganography. Int. J. Eng. Res. Appl. 3(4), 1738–1741 (2013)

    Google Scholar 

  7. Chung, C.H., Chen, W.Y., Tu, C.M.: Image hidden technique using QR-barcode. In: The 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP’09), IEEE-Proceedings, pp. 522–525 (2009)

  8. Vongpradhip, S., Rungraungsilp, S.: QR code using invisible watermarking in frequency domain. In: 2011 9th International Conference on ICT and Knowledge Engineering, pp. 47–52 (2012)

  9. Denso Wave, the Inventor of QR Code. http://www.qrcode.com/en/ (1994)

  10. Chang, Y.H., Chu, C.H., Chen, M.S.: A General scheme for extracting QR code from a non-uniform background in camera phones and applications. In: IEEE-proceedings, The 9th IEEE international symposium on multimedia (ISM 2007), pp. 123–130 (2007)

  11. Reed, I.S., Solomon, G.: Polynomial codes over certain finite fields. J. Soc. Ind. Appl. Math. 8(2), 300–304 (1960)

    Article  MathSciNet  MATH  Google Scholar 

  12. Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993–999 (1978)

    Article  MATH  Google Scholar 

  13. Neuman, B.C., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Commun. Mag. 32(9), 33–38 (1994)

    Article  Google Scholar 

  14. Denning, D.E., Sacco, G.M.: Timestamps in key distribution protocols. Commun. ACM 24(8), 533–536 (1981)

    Article  Google Scholar 

  15. Lowe, G.: An attack on the Needham–Schroeder public-key authentication protocol. Inf. Process. Lett. 56(3), 131–133 (1995)

    Article  MATH  Google Scholar 

  16. Lowe, G.: Breaking and fixing the Needham–Schroeder public-key protocol using FDR. In: The 2nd International Workshop, TACAS 1996 Passau, Germany, Lecture Notes in Computer Science, vol. 1055, Springer, Berlin, pp. 147–166 (1996)

  17. Formal Systems (Europe) Ltd. Failures Divergence Refinement-User Manual and Tutorial ver. 1.3 (1993)

  18. Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. Proc. R. Soc. A Math. Phys. Sci. 426(1871), 233–271 (1989)

    Article  MathSciNet  MATH  Google Scholar 

  19. Gong, L., Needham, R., Yahalom, R.: Reasoning about belief in cryptographic protocols. In: IEEE-Proceedings, Computer Society Symposium on Research in Security, pp. 234–248 (1990)

  20. Ding, Y.: An improvement of GNY logic for the reflection attacks. J. Comput. Sci. Technol. 14(6), 619–623 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  21. Mathuria, A.M., Safavi-Naini, R., Nickolas, P.R.: On the automation of GNY logic. In: IEEE Computer Society Press Los Alamitos, Australian Computer Science Communications, pp. 370–379 (1995)

  22. Asokan, N., Niemi, V., Nyberg, K.: Man-in-the-middle in tunnelled authentication protocols. In: The 11th International Workshop, Cambridge, UK, Lecture Notes in Computer Science, vol. 3364, Springer, Berlin, pp. 28–41 (2005)

  23. Perlman, R.: An overview of PKI trust models. IEEE Netw. 13(6), 38–43 (1999)

    Article  Google Scholar 

  24. Syverson, P.: A taxonomy of replay attacks [rcryptographic protocols]. In: IEEE-Proceedings, Computer Security Foundations Workshop VII (CSFW 7), pp. 187–191 (1994)

Download references

Acknowledgments

This research was partially supported by the National Science Council of the Republic of China under the Grant MOST 105-2221-E-008-070-MY2, MOST 104-2221-E-015-001-, NSC 101-2218-E-008-003-, and the Software Research Center, National Central University, Taiwan.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shiuh-Jeng Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, CT., Zhang, YH., Lin, LC. et al. Mutual authentications to parties with QR-code applications in mobile systems. Int. J. Inf. Secur. 16, 525–540 (2017). https://doi.org/10.1007/s10207-016-0349-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-016-0349-6

Keywords

Navigation