scispace - formally typeset
Proceedings ArticleDOI

A Robust and Efficient Smart Card Oriented Remote User Authentication Protocol

TLDR
This paper first analyzes Yeh et al.s security flaws, then, a protocol is proposed that overcomes all the weaknesses of the aforementioned protocol and features user¡¦s anonymity.
Abstract
Authentication and key agreement protocols are foundation for the security of distributed applications. In 2010, Yeh et al. proposed two authenticated key agreement protocols. The second protocol in Yeh et al. features useri¦s anonymity. However, we found that the second scheme is vulnerable to replay attack, masquerade attack, and off-line password attack. In this paper, we first analyze Yeh et al.i¦s security flaws, then, we propose a protocol that overcomes all the weaknesses of the aforementioned protocol.

read more

Citations
More filters
Journal ArticleDOI

Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model

TL;DR: This paper proposes a novel dynamic ID-based anonymous two-factor AKE protocol, which extends the security model of AKE to support user anonymity and resist lost-smart-card attack, and the proposed scheme is provably secure in extended security model.
Proceedings ArticleDOI

Cryptanalysis of a robust and efficient smart card oriented remote user authentication protocol

TL;DR: It is shown that Chang et al.'s scheme fails to protect user privacy in terms of anonymity and traceability, and it is vulnerable to the server counterfeit attack and it does not provide perfect forward secrecy for session keys.
Proceedings ArticleDOI

Mobile Friendly and Highly Efficient Remote User Authenticated Key Agreement Protocol Featuring Untraceability

TL;DR: An authentication and key agreement scheme that is secure and has low communication and computation costs is proposed to provide initiator untraceability which completely conceals the users' identities from all eavesdropping adversaries.

A replay attack resistance drm scheme based on physical level file location

TL;DR: This work creates a virtual tamper-proof hardware simulation instead of a real one, and introduces the concept of Placeholder File (PF), and shows the effectiveness of this scheme bases on the change of physical level PF location in the stable storage device.
References
More filters
Journal ArticleDOI

Password authentication with insecure communication

TL;DR: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system.
Journal ArticleDOI

A new remote user authentication scheme using smart cards

TL;DR: This work proposes a new remote user authentication scheme using smart cards based on the ElGamal's (1985) public key cryptosystem that can withstand message replaying attack.
Journal ArticleDOI

A dynamic ID-based remote user authentication scheme

TL;DR: This paper presents a dynamic ID-based remote user authentication scheme using smart cards that allows the users to choose and change their passwords freely, and do not maintain any verifier table.
Journal ArticleDOI

A more efficient and secure dynamic ID-based remote user authentication scheme

TL;DR: An enhanced password authentication scheme which still keeps the merits of the original scheme was presented and security analysis proved that the improved scheme is more secure and practical.
Journal ArticleDOI

An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem

TL;DR: The proposed ID-based remote mutual authentication with key agreement scheme on ECC does not require public keys for users such that the additional computations for certificates can be reduced and not only provides mutual authentication but also supports a session key agreement between the user and the server.
Related Papers (5)