{"title":"一种高效的基于智能卡的哈希远程用户认证方案","authors":"S. S. Sonwanshi, R. Ahirwal, Y. K. Jain","doi":"10.1109/SCEECS.2012.6184815","DOIUrl":null,"url":null,"abstract":"Remote user Authentication is a way to restrict access to only those users that are legitimate for remote access. The authentication mechanism is cryptography technique to protect unauthorized access of a network system. Recently, more efficient ID-based and password authentication schemes are proposed by, H.T. Liaw, Wang and Xu R. Song, however, Liaw's and Wang's scheme are vulnerable to offline password attack and server masquerade attack parallel session attack. Xu's scheme is vulnerable to an impersonation attack and R. Song's Scheme is vulnerable to insider attack, lack of perfect forward security for session keys and denial-of-service attack. In 2010 S.K. Sood proposed an improvement of Liao et al's scheme. However, this scheme did not provided mutual authentication and maintaining database for verification of the legitimate user. In this paper, we analyze few attacks and finally propose an Efficient Smart card based Remote User Authentication Scheme. The proposed scheme resists most of the current possible attack and provides the essential security requirements.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"85 3","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"An Efficient Smart card based Remote User Authentication Scheme using hash function\",\"authors\":\"S. S. Sonwanshi, R. Ahirwal, Y. K. Jain\",\"doi\":\"10.1109/SCEECS.2012.6184815\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Remote user Authentication is a way to restrict access to only those users that are legitimate for remote access. The authentication mechanism is cryptography technique to protect unauthorized access of a network system. Recently, more efficient ID-based and password authentication schemes are proposed by, H.T. Liaw, Wang and Xu R. Song, however, Liaw's and Wang's scheme are vulnerable to offline password attack and server masquerade attack parallel session attack. Xu's scheme is vulnerable to an impersonation attack and R. Song's Scheme is vulnerable to insider attack, lack of perfect forward security for session keys and denial-of-service attack. In 2010 S.K. Sood proposed an improvement of Liao et al's scheme. However, this scheme did not provided mutual authentication and maintaining database for verification of the legitimate user. In this paper, we analyze few attacks and finally propose an Efficient Smart card based Remote User Authentication Scheme. The proposed scheme resists most of the current possible attack and provides the essential security requirements.\",\"PeriodicalId\":372799,\"journal\":{\"name\":\"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science\",\"volume\":\"85 3\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SCEECS.2012.6184815\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SCEECS.2012.6184815","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12
摘要
远程用户身份验证是一种将访问权限限制为只有合法远程访问权限的用户的方法。认证机制是一种加密技术,用于保护网络系统的非授权访问。最近,H.T. Liaw、Wang和Xu R. Song提出了更高效的基于id和密码的认证方案,然而,Liaw和Wang的方案容易受到离线密码攻击和服务器伪装攻击并行会话攻击。Xu的方案容易受到假冒攻击,R. Song的方案容易受到内部攻击,缺乏完善的会话密钥前向安全性和拒绝服务攻击。2010年S.K. Sood对Liao等人的方案提出了改进。但是,该方案不提供相互认证和维护数据库来验证合法用户。本文对几种攻击进行了分析,最后提出了一种高效的基于智能卡的远程用户认证方案。该方案能够抵抗当前大多数可能的攻击,并提供基本的安全要求。
An Efficient Smart card based Remote User Authentication Scheme using hash function
Remote user Authentication is a way to restrict access to only those users that are legitimate for remote access. The authentication mechanism is cryptography technique to protect unauthorized access of a network system. Recently, more efficient ID-based and password authentication schemes are proposed by, H.T. Liaw, Wang and Xu R. Song, however, Liaw's and Wang's scheme are vulnerable to offline password attack and server masquerade attack parallel session attack. Xu's scheme is vulnerable to an impersonation attack and R. Song's Scheme is vulnerable to insider attack, lack of perfect forward security for session keys and denial-of-service attack. In 2010 S.K. Sood proposed an improvement of Liao et al's scheme. However, this scheme did not provided mutual authentication and maintaining database for verification of the legitimate user. In this paper, we analyze few attacks and finally propose an Efficient Smart card based Remote User Authentication Scheme. The proposed scheme resists most of the current possible attack and provides the essential security requirements.