Cryptanalysis and improvement of chen-hsiang-shih's remote user authentication scheme using smart cards

Cita com:
hdl:2117/20795
Document typeArticle
Defense date2013-09
Rights accessOpen Access
This work is protected by the corresponding intellectual and industrial property rights.
Except where otherwise noted, its contents are licensed under a Creative Commons license
:
Attribution-NonCommercial-NoDerivs 3.0 Spain
Abstract
Recently, Chen-Hsiang-Shih proposed a new dynamic ID-based remote user authentication scheme. The authors claimed that their scheme was more secure than previous works. However, this paper demonstrates that theirscheme is still unsecured against different kinds of attacks. In order to enhance the security of the scheme proposed by Chen-Hsiang-Shih, a new scheme is proposed. The scheme achieves the following security goals: without verification table, each user chooses and changes the password freely, each user keeps the password secret, mutual authentication, the scheme establishes a session key after successful authentication, and the scheme maintains the user's anonymity. Security analysis and comparison demonstrate that the proposed scheme is more secure than Das-Saxena-Gulati's scheme, Wang et al.'s scheme and Chen-Hsiang-Shih.
CitationMartínez, R.; Rico, F.; Velarde-Alvarado, P. Cryptanalysis and improvement of chen-hsiang-shih's remote user authentication scheme using smart cards. "Revista Facultad de Ingeniería. Universidad de Antioquía", Setembre 2013, vol. 68, p. 27-35.
ISSN0120-6230
Files | Description | Size | Format | View |
---|---|---|---|---|
Cryptanalysis and improvement of Chen-Hsiang.pdf | Cryptanalysis and improvement of Chen-Hsiang- Shih’s remote user authentication scheme using smart cards | 1Mb | View/Open |