scispace - formally typeset
Journal ArticleDOI

New dynamic ID authentication scheme using smart cards

TLDR
It is demonstrated that both of the proposed schemes cannot achieve the security requirement for user anonymity and resist an impersonation attack yet, and a new dynamic ID authentication scheme is proposed to overcome the above security weaknesses.
Abstract
Recently, Yoon et al. and Wang et al. independently proposed a dynamic ID authentication scheme and claimed that their schemes can withstand the risk of ID-theft, and several attacks. In this paper, we first demonstrate that both of the proposed schemes cannot achieve the security requirement for user anonymity and resist an impersonation attack yet. Then, we shall propose a new dynamic ID authentication scheme to overcome the above security weaknesses. We formally analyzed our proposed scheme with the BAN-logic and shown that it can withstand the several possible attacks. Copyright © 2010 John Wiley & Sons, Ltd.

read more

Citations
More filters
Journal ArticleDOI

A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks

TL;DR: The proposed protocol not only resists the above mentioned security weaknesses, but also achieves complete security requirements including specially energy efficiency, user anonymity, mutual authentication and user-friendly password change phase.
Journal ArticleDOI

A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment

TL;DR: Security vulnerabilities of the multi-server cloud environment of the protocols proposed by Xue et al. and Chuang et al are shown and an informal cryptanalysis confirms that the protocol is protected against all possible security threats.
Journal ArticleDOI

Security flaws in two improved remote user authentication schemes using smart cards

TL;DR: The cryptanalysis results discourage any practical use of the two investigated schemes and are important for security engineers to make their choices correctly, whereas the proposed three principles are valuable to protocol designers for advancing more robust schemes.
Journal ArticleDOI

Preserving privacy for free

TL;DR: It is shown that user privacy of Kim-Kim's scheme is achieved at the price of severe usability downgrade - a de-synchronization attack on user's pseudonym identities may render the scheme completely unusable unless the user re-registers.
Journal ArticleDOI

Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services

TL;DR: Security analysis shows that the proposed PAA scheme is able to address the serious security problems existing in Tsai and Lo's scheme and can meet security requirements for MCC services.
References
More filters
Journal ArticleDOI

A public key cryptosystem and a signature scheme based on discrete logarithms

TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Journal ArticleDOI

Password authentication with insecure communication

TL;DR: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system.
Journal ArticleDOI

A logic of authentication

TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Proceedings ArticleDOI

A logic of authentication

TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Journal ArticleDOI

A new remote user authentication scheme using smart cards

TL;DR: This work proposes a new remote user authentication scheme using smart cards based on the ElGamal's (1985) public key cryptosystem that can withstand message replaying attack.
Related Papers (5)