Elsevier

Computers & Security

Volume 24, Issue 8, November 2005, Pages 619-628
Computers & Security

Robust remote authentication scheme with smart cards

https://doi.org/10.1016/j.cose.2005.03.006Get rights and content

Abstract

Due to low-computation cost and convenient portability, smart cards are usually adopted to store the personal secret information of users for remote authentication. Although many remote authentication schemes using smart cards have been introduced in the literatures, they still suffer from some possible attacks or cannot guarantee the quality of performance for smart cards. In this paper, we classify the security criteria of remote authentication and propose a new remote login scheme using smart cards to satisfy all of these criteria. Not only does the proposed scheme achieve the low-computation requirement for smart cards, but also it can withstand the replay and the offline dictionary attacks as well. Moreover, our scheme requires neither any password table for verification nor clock synchronization between each user and the server while providing both mutual authentication and the uniqueness of valid cards.

Introduction

In order to authenticate the clients or users, password-based security mechanisms have been widely used in many remote login systems because they are easily implemented. In a traditional authentication scheme, the server or system must keep a password table to store all of the passwords of the registered users in the system. Since the password tables cannot be revealed and they are usually large, it is hard and inefficient to maintain such tables. To cope with the problem, secure remote password authentication was firstly proposed by Lamport (1981) and several methods, based on one-way hashing functions (Evan et al., 1974, Lennon et al., 1981) and TTP (Kehne et al., 1992, Neuman and Stubblebine, 1993, Shieh and Yang, 1996), have also been introduced in the literatures. However, some known or unknown attacks on the password tables may be still valid in these authentication schemes. To avoid all possible attacks on the password tables, many authentication schemes based on smart cards without password tables were proposed (Chang and Wu, 1991, Chien et al., 2002, Hwang and Li, 2000, Hwang et al., 2002, Juang, 2004, Lee et al., 2002, Lin et al., 2003, Sun, 2000, Tan and Zhu, 1999, Wang and Chang, 1996, Wang, 2003, Wu, 1995, Wu and Chieu, 2003, Yang and Shieh, 1999).

Since the computation capabilities of smart cards are limited, time-consuming operations are not suitable in such environments. The schemes of (Chang and Wu, 1991, Chien et al., 2002, Hwang et al., 2002, Juang, 2004, Lee et al., 2002, Lin et al., 2003, Sun, 2000, Wang, 2003) take low-cost functions or operators, such as hashing functions, exclusive-or operations, or multiplicative operations, instead of the operations with heavy computational workload, like exponentiation computations, to build their protocols. Besides, it is difficult for the users to memorize the long and meaningless passwords those are generated by the system. Hence, the schemes of (Chien et al., 2002, Hwang et al., 2002, Juang, 2004, Lee et al., 2002, Lin et al., 2003, Tan and Zhu, 1999, Wang and Chang, 1996, Wang, 2003, Wu, 1995, Wu and Chieu, 2003, Yang and Shieh, 1999) have been designed to allow the users themselves to choose their passwords freely.

In remote authentication protocols, intruders may intercept the login messages transmitted between the users and the system. They then re-send the system the messages and attempt to impersonate the legitimate users to login the system. This is called the replay attack. In order to prevent the attack, timestamps are usually used in remote authentication schemes (Chang and Wu, 1991, Chien et al., 2002, Hwang and Li, 2000, Hwang et al., 2002, Lee et al., 2002, Sun, 2000, Tan and Zhu, 1999, Wang and Chang, 1996, Wang, 2003, Wu, 1995, Wu and Chieu, 2003). However, the schemes based on timestamps must overcome the problems of clock synchronization and delay-time limitation so that we better implement them in fast local area networks. In a large-scale network, it is almost impossible to maintain the synchronization of clocks among all entities in the network and to guarantee the delay time of transmission. For large-scale networks, Yang and Shieh (1999) proposed a remote authentication scheme based on “nonce” instead of timestamps without the problems of clock synchronization and delay-time limitation. Unfortunately, some security weaknesses have been found in Yang and Shieh's scheme (Chen and Zhong, 2003).

Malicious parties may catch the information stored in the smart card of some user by some ways, such as the attackers successfully crack the smart card that was lost by the user (Kocher et al., 1999, Messerges et al., 2002) or the attackers obtain the information in the smart card via an illegal card reader or device. With the information stored in the smart card and the messages intercepted during the previous login transactions between the user and the system, the attackers can repeatedly guess the user's password and examine if the guessed password is correct through performing an offline hacking program (Hsu, 2003, Ku and Chen, 2004, Yang and Wang, 2004, Yeh et al., 2001). This is called the offline dictionary attack with the smart card. If the attackers obtain the information in the smart card and find the correct password via the attack, they can pass the authentication process and then login the system successfully. Nevertheless, most of the schemes proposed in the literatures have not considered the protection mechanism in their protocols to withstand the attack (Chien et al., 2002, Hwang et al., 2002, Juang, 2004, Lee et al., 2002, Lin et al., 2003, Tan and Zhu, 1999, Wang and Chang, 1996, Wang, 2003, Wu, 1995, Wu and Chieu, 2003, Yang and Shieh, 1999).

In a basic remote authentication scheme, the system only checks the validation of the users but the users never verify whether the server is legal or not. It may affect the security of the entire protocol since an illegal system may cheat the users and obtain some secret information from them. In (Chien et al., 2002, Yen and Liao, 1997), the idea of mutual authentication is introduced such that the system and each of the users can be authenticated by each other.

If a remote authentication scheme can resist the offline dictionary attack with the smart card, then the user who lost her/his smart card just needs to re-register with the system and requests a new card from the system without changing the password. However, if the user lost both her/his card and the password, she/he has to acquire not only a new card but also a new password even though the scheme can withstand the offline dictionary attack with the smart card. There is another serious problem that the attackers may use the lost card and password to login the system successfully if the system cannot distinguish the new card from the lost one. Therefore, to avoid the misuse of the lost cards, the system should revoke or disable all of them. Most of the schemes proposed in the literatures cannot provide an efficient solution for this problem.

According to our analysis, we summarize the criteria for a secure remote authentication scheme using smart cards as follows:

  • 1.

    The computational workload of the smart card must be low.

  • 2.

    The system does not keep the table containing the passwords of the users.

  • 3.

    The users can choose their own passwords freely.

  • 4.

    The scheme does not require time synchronization and delay-time limitation.

  • 5.

    The scheme can withstand the replay attack.

  • 6.

    The scheme can provide mutual authentication.

  • 7.

    The scheme can resist the offline dictionary attack with the smart card.

  • 8.

    The lost cards can be revoked.

In this paper, we will propose a new remote authentication scheme with smart cards where it aims at matching all of the eight criteria. In Section Basic idea, we explain the basic idea of our scheme. The proposed scheme is presented in Section Our scheme. In Section Discussions and Section Performance analysis, we examine the security and performance of our scheme and compare it with the others. Finally, a concluding remark is given in Section Conclusion.

Section snippets

Basic idea

The proposed remote authentication scheme using smart cards is based on some key ideas which are listed as follows:

  • 1.

    Breaking the password table into pieces: To eliminate the password table in a remote login protocol, we can break it into pieces and encrypt each piece, containing the user's identity and (hashed) password, with the secret key of the system. The system then stores the encrypted pieces in the smart cards of the users, at the registration stage. If a user decides to login the system,

Our scheme

The proposed scheme consists of two protocols, i.e., the registration and the login protocols. In the registration protocol, the system identifies users and then issues a smart card to each identified user. The registration protocol is only executed once for each user unless the user lost her/his card or forgot the password. The login protocol is performed whenever the user is decided to login the system. The user inserts the smart card into a card reader and then inputs her/his password. The

Discussions

In this section we examine the security of the scheme proposed in Section Our scheme.

  • (1)

    Low computation for the smart card: in the login protocol, only four times of hashing computation, one time of random-number generation, one modular squaring computation, and some low-cost operations, such as string concatenation and exclusive-or operations, are required to be performed by the smart card. Since the computation cost of them is extremely low, user efficiency is guaranteed in the proposed protocol.

Performance analysis

In this section, we will evaluate the performance of the proposed scheme and make comparison with the others.

Typically, under a modulus n, the computation cost of a modular exponentiation computation is about O(|n|) times that of a modular multiplication computation where n is a large prime or the product of two distinct large primes and |n| denotes the bit length of n (Menezes et al., 1997). The modulus n is usually taken at least 1024 bits in practical implementation. Besides, an inverse

Conclusion

We have proposed a user efficient remote authentication scheme using smart cards. Especially, our scheme can resist the offline dictionary attack with the smart card such that the scheme is robust even if the attackers acquire the information stored in the smart card. Furthermore, all of the cards lost by some users can be disabled in the proposed scheme so that the attackers cannot impersonate the users to login the system even though they obtain the lost cards and the corresponding passwords.

Chun-I Fan was born in Tainan, Taiwan on October 15, 1967. He received his M.S. degree in computer science and information engineering from National Chiao Tung University, Taiwan, in 1993, and the Ph.D. degree in electrical engineering at National Taiwan University in 1998. From 1999 to 2003, he was an associate researcher of Telecommunication Laboratories, Chunghwa Telecom Co., Ltd, Taiwan. In 2003, he joined the faculty of the department of computer science and engineering, National Sun

References (32)

  • A.J. Evan et al.

    A user authentication system not requiring secrecy in the computer

    Communications of ACM

    (1974)
  • C.L. Hsu

    Security of two remote authentication schemes using smart cards

    IEEE Transactions on Consumer Electronics

    (2003)
  • M.S. Hwang et al.

    A new remote user authentication scheme using smart cards

    IEEE Transactions on Consumer Electronics

    (2000)
  • A. Kehne et al.

    A nonce-based protocol for multiple authentication

    ACM Operating Systems Review

    (1992)
  • P. Kocher et al.

    Differential power analysis

    Proceedings of Advances in Cryptology (CRYPTO' 99)

    (1999)
  • W.C. Ku et al.

    Weakness and improvements of an efficient password based remote user authentication scheme using smart cards

    IEEE Transactions on Consumer Electronics

    (2004)
  • Cited by (149)

    • An improved and secure multiserver authentication scheme based on biometrics and smartcard

      2018, Digital Communications and Networks
      Citation Excerpt :

      Numerous authentication schemes based on smartcard exist in literature. In these schemes [1–13], a user needs to register with each server for receiving the services in a multiserver environment, thus requiring multiple smartcards and various identities and passwords, making the process very frustrating. This issue was addressed by incorporating a central authority, which is the only entity that the user is required to register to access the services in a multiserver system.

    View all citing articles on Scopus

    Chun-I Fan was born in Tainan, Taiwan on October 15, 1967. He received his M.S. degree in computer science and information engineering from National Chiao Tung University, Taiwan, in 1993, and the Ph.D. degree in electrical engineering at National Taiwan University in 1998. From 1999 to 2003, he was an associate researcher of Telecommunication Laboratories, Chunghwa Telecom Co., Ltd, Taiwan. In 2003, he joined the faculty of the department of computer science and engineering, National Sun Yat-sen University, Kaohsiung, Taiwan. He also is an editor of Information Security Newsletter, Chinese Cryptology and Information Security Association. His current research interests include information security, cryptographic protocols, wireless security, and electronic commerce.

    Yung-Cheng Chan was born in Taiwan, 1980. He received the B.S. degree in computer science from National Taiwan Ocean University, Keelung, Taiwan. He is currently a Master student in computer science and engineering, National Sun Yat-sen University, Kaohsiung, Taiwan. His current research interests include cryptography, network security and management, and information security.

    Zhi-Kai Zhang was born in Taiwan, 1978. He received the M.S. degree in computer science and engineering from National Sun Yat-sen University, Kaohsiung, Taiwan, in 2004. He is currently a researcher in NCTU/CISCO Internetworking Technology Laboratory of National Chiao Tung University, Hsinchu, Taiwan. He is also a member of International Association for Development of the Information Society (IADIS). His current research interests include digital signatures, authentication, secure protocols, and information security.

    This research was partially supported by the National Science Council of the Republic of China under grant NSC93-2213-E-110-044.

    View full text