A lightweight authentication scheme with user untraceability
Kuo-Hui YEH
A lightweight authentication scheme with user untraceability
With the rapid growth of electronic commerce and associated demands on variants of Internet based applications, application systems providing network resources and business services are in high demand around the world. To guarantee robust security and computational efficiency for service retrieval, a variety of authentication schemes have been proposed. However, most of these schemes have been found to be lacking when subject to a formal security analysis. Recently, Chang et al. (2014) introduced a formally provable secure authentication protocol with the property of user-untraceability. Unfortunately, based on our analysis, the proposed scheme fails to provide the property of user-untraceability as claimed, and is insecure against user impersonation attack, server counterfeit attack, and man-in-the-middle attack. In this paper, we demonstrate the details of these malicious attacks. A security enhanced authentication scheme is proposed to eliminate all identified weaknesses.
Authentication / Privacy / Security / Smart card / Untraceability
[1] |
Bellare, M., Rogaway, P., 1994. Entity authentication and key distribution. LNCS, 773: 232-249.
|
[2] |
Bellare, M., Pointcheval, D., Rogaway, P., 2000. Authenticated key exchange secure against dictionary attacks. Advances in Cryptology-EUROCRYPT, p.139-155.
|
[3] |
Blake-Wilson, S., Johnson, D., Menezes, A., 1997. Key agreement protocols and their security analysis. 6th IMA Int. Conf. on Cryptography Coding, p.30-45.
|
[4] |
Burrows, M., Abadi, M., Needham, R., 1990. A logic of authentication. ACM Trans. Comput. Syst., 8(1):18-36. [
CrossRef
Google scholar
|
[5] |
Chang, C.C., Lee, C.Y., 2012. A secure single sign-on mechanism for distributed computer networks. IEEE Trans. Ind. Electron., 59(1): 629-637. [
CrossRef
Google scholar
|
[6] |
Chang, Y.F., Tai, W.L., Chang, H.C., 2014. Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update. Int. J. Commun. Syst., 27(11): 3430-3440. [
CrossRef
Google scholar
|
[7] |
He, D., Wu, S., 2012. Security flaws in a smart card based authentication scheme for multi-server environment. Wirel. Pers. Commun., 70(1): 323-329. [
CrossRef
Google scholar
|
[8] |
Hsiang, C., Shih, W.K., 2009. Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interf., 31(6): 1118-1123. [
CrossRef
Google scholar
|
[9] |
Hsieh, W., Leu, J., 2012. Exploiting hash functions to intensify the remote user authentication scheme. Comput. Secur., 31(6): 791-798. [
CrossRef
Google scholar
|
[10] |
Huang, X., Chen, X., Li, J.,
CrossRef
Google scholar
|
[11] |
Juang, W.S., Chen, S.T., Liaw, H.T., 2008. Robust and efficient password-authenticated key agreement using smart cards. IEEE Trans. Ind. Electron., 55(6): 2551-2556. [
CrossRef
Google scholar
|
[12] |
Kumari, S., Khan, M.K., 2014. Cryptanalysis and improvement of a robust smart-card-based remote user password authentication scheme. Int. J. Commun. Syst., 27(12): 3939-3955. [
CrossRef
Google scholar
|
[13] |
Lamport, L., 1981. Password authentication with insecure communication. Commun. ACM, 24(11): 770-772. [
CrossRef
Google scholar
|
[14] |
Li, C.T., Lee, C.C., Liu, C.J.,
|
[15] |
Li, X., Qiu, W., Zheng, D.,
CrossRef
Google scholar
|
[16] |
Li, X., Xiong, Y., Ma, J.,
CrossRef
Google scholar
|
[17] |
Liao, Y.P., Wang, S.S., 2009. A secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interf., 31(1): 24-29. [
CrossRef
Google scholar
|
[18] |
Sood, S.K., Sarje, A.K., Singh, K., 2011. A secure dynamic identity based authentication protocol for multi-server architecture. J. Network Comput. Appl., 34(2): 609-618. [
CrossRef
Google scholar
|
[19] |
Sun, D.Z., Huai, J.P., Sun, J.Z.,
CrossRef
Google scholar
|
[20] |
Tsai, J.L., Lo, N.W., Wu, T.C., 2013. Novel anonymous authentication scheme using smart cards. IEEE Trans. Ind. Inform., 9(4): 2004-2013. [
CrossRef
Google scholar
|
[21] |
Wang, D., Ma, C.G., 2012. Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards. J. China Univ. Posts Telecommun., 19(5): 104-114. [
CrossRef
Google scholar
|
[22] |
Wang, D., Wang, P., 2013. Offline dictionary attack on password authentication schemes using smart cards. 16th Information Security Conf., p.1-16.
|
[23] |
Wang, D., Wang, P., 2014. On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput. Networks, 73: 41-57. [
CrossRef
Google scholar
|
[24] |
Wang, D., Ma, C., Wang, P.,
|
[25] |
Wang, D., Ma, C., Wang, P., 2012b. Secure password-based remote user authentication scheme with non-tamper resistant smart cards. 26th Annual IFIP Conf. on Data and Applications Security and Privacy, p.114-121.
|
[26] |
Wang, D., He, D., Wang, P.,
CrossRef
Google scholar
|
[27] |
Wang, G., Yu, J., Xie, Q., 2013. Security analysis of a single sign-on mechanism for distributed computer networks. IEEE Trans. Ind. Inform., 9(1): 294-302. [
CrossRef
Google scholar
|
[28] |
Wang, Y., 2012. Password protected smart card and memory stick authentication against off-line dictionary attacks. 27th IFIP TC 11 Information Security and Privacy Conf., p.489-500.
|
[29] |
Yeh, K.H., Lo, N.W., Li, Y., 2011. Cryptanalysis of Hsiang-Shih’s authentication scheme for multi-server architecture. Int. J. Commun. Syst., 24(7): 829-836. [
CrossRef
Google scholar
|
/
〈 | 〉 |