CFP last date
20 December 2024
Reseach Article

An Improvement of Liou et al.’s Authentication Scheme using Smart Cards

by Sandeep K. Sood, Anil K. Sarje, Kuldip Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 8
Year of Publication: 2010
Authors: Sandeep K. Sood, Anil K. Sarje, Kuldip Singh
10.5120/188-325

Sandeep K. Sood, Anil K. Sarje, Kuldip Singh . An Improvement of Liou et al.’s Authentication Scheme using Smart Cards. International Journal of Computer Applications. 1, 8 ( February 2010), 16-23. DOI=10.5120/188-325

@article{ 10.5120/188-325,
author = { Sandeep K. Sood, Anil K. Sarje, Kuldip Singh },
title = { An Improvement of Liou et al.’s Authentication Scheme using Smart Cards },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 8 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 16-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number8/188-325/ },
doi = { 10.5120/188-325 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:45:10.477381+05:30
%A Sandeep K. Sood
%A Anil K. Sarje
%A Kuldip Singh
%T An Improvement of Liou et al.’s Authentication Scheme using Smart Cards
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 8
%P 16-23
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In 2004, Das et al. proposed a dynamic identity based remote user authentication scheme. This scheme allows the users to choose and change their passwords freely and the server does not maintain any verification table. Das et al. claimed that their scheme is secure against stolen verifier attack, replay attack, forgery attack, dictionary attack, insider attack and identity theft. Unfortunately, many researchers demonstrated that Das et al.'s scheme is susceptible to various attacks. Furthermore, this scheme does not achieve mutual authentication and thus can not resist malicious server attack. In 2006, Liou et al. improved Das et al.'s scheme and claimed that the improved scheme achieves mutual authentication and is secure against aforementioned attacks. However, we found that Liou et al.'s scheme is susceptible to impersonation attack, malicious user attack, offline password guessing attack and man-in-the-middle attack. This paper presents a secure dynamic identity based authentication scheme using smart cards to resolve the aforementioned problems, while keeping the merits of different dynamic identity based authentication schemes.

References
  1. L. Lamport. Password Authentication with Insecure Communication. Communications of the ACM, vol. 24, no. 11, pages 770-772. November 1981.
  2. M.L. Das, A. Saxena and V.P. Gulati. A Dynamic ID-Based Remote User Authentication Scheme. IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pages 629-631. May 2004.
  3. H.Y. Chien and C.H. Chen. A Remote Authentication Scheme Preserving User Anonymity. In Proceedings of Advanced Information Networking and Applications, vol. 2, pages 245-248. March 2005.
  4. I.E. Liao, C.C. Lee and M.S. Hwang. Security Enhancement for a Dynamic ID-Based Remote User Authentication Scheme. In Proceeding of Conference on Next Generation Web Services Practice, pages 437-440. July 2005.
  5. E.J. Yoon and K.Y. Yoo. Improving the Dynamic ID-Based Remote Mutual Authentication Scheme. In Proceedings of OTM Workshops 2006, LNCS 4277, pages 499-507. July 2006.
  6. Y.P. Liou, J. Lin and S.S. Wang. A New Dynamic ID-Based Remote User Authentication Scheme using Smart Cards. In Proceedings of 16th Information Security Conference, Taiwan, pages 198-205. July 2006.
  7. H.C. Shih. Cryptanalysis on Two Password Authentication Schemes. Laboratory of Cryptography and Information Security, National Central University, Taiwan, July 2008.
  8. W.C. Ku and S.T. Chang. Impersonation Attack on a Dynamic ID-based Remote User Authentication Scheme using Smart Cards. IEICE Transactions on Communications, vol. E88-B, no. 5, pages 2165-2167. May 2005.
  9. P. Kocher, J. Jaffe and B. Jun. Differential Power Analysis. Proc. CRYPTO 99, Springer-Verlag, pages 388-397. August 1999.
  10. T.S. Messerges, E.A. Dabbish and R.H. Sloan. Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Transactions on Computers, vol. 51, no. 5, pages 541-552. May 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Network Security Cryptography Password Authentication Protocol Smart Card Hash Function