R. Martínez-Peláez, F. Rico-Novella, C. Satizábal, J. Pomykala
{"title":"基于动态id的远程用户认证方案的改进","authors":"R. Martínez-Peláez, F. Rico-Novella, C. Satizábal, J. Pomykala","doi":"10.1109/I-SOCIETY16502.2010.6018817","DOIUrl":null,"url":null,"abstract":"Recently, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme and claimed that their scheme is secure. In this paper, we show that Das, Saxena and Gulati's scheme is vulnerable to insider, masquerade, and server spoofing attacks. Moreover, it fails to provide mutual authentication. In order to remedy these drawbacks, this paper proposes a secure dynamic ID-based remote user authentication scheme using smart cards. The performance evaluation and security analysis show that our proposal is feasible in terms of computational cost, storage capacity, and the scheme can resist several attacks.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":" 3","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Improvement of the dynamic ID-based remote user authentication scheme\",\"authors\":\"R. Martínez-Peláez, F. Rico-Novella, C. Satizábal, J. Pomykala\",\"doi\":\"10.1109/I-SOCIETY16502.2010.6018817\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recently, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme and claimed that their scheme is secure. In this paper, we show that Das, Saxena and Gulati's scheme is vulnerable to insider, masquerade, and server spoofing attacks. Moreover, it fails to provide mutual authentication. In order to remedy these drawbacks, this paper proposes a secure dynamic ID-based remote user authentication scheme using smart cards. The performance evaluation and security analysis show that our proposal is feasible in terms of computational cost, storage capacity, and the scheme can resist several attacks.\",\"PeriodicalId\":407855,\"journal\":{\"name\":\"2010 International Conference on Information Society\",\"volume\":\" 3\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-06-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Information Society\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/I-SOCIETY16502.2010.6018817\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Information Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018817","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Improvement of the dynamic ID-based remote user authentication scheme
Recently, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme and claimed that their scheme is secure. In this paper, we show that Das, Saxena and Gulati's scheme is vulnerable to insider, masquerade, and server spoofing attacks. Moreover, it fails to provide mutual authentication. In order to remedy these drawbacks, this paper proposes a secure dynamic ID-based remote user authentication scheme using smart cards. The performance evaluation and security analysis show that our proposal is feasible in terms of computational cost, storage capacity, and the scheme can resist several attacks.