Improvement of recently proposed Remote User Authentication Schemes

Slides:



Advertisements
Similar presentations
An Introduction to Pairing Based Cryptography Dustin Moody October 31, 2008.
Advertisements

11 Efficient and Secure Certificateless Authentication and Key Agreement Protocol for Hybrid P2P Network Authors: Z. B. Xu and Z. W. Li Source: The 2nd.
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
A simple remote user authentication scheme 1. M. S. Hwang, C. C. Lee and Y. L. Tang, “A simple remote user authentication.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
電子商務與數位生活研討會 1 Further Security Enhancement for Optimal Strong-Password Authentication Protocol Tzung-Her Chen, Gwoboa Horng, Wei-Bin Lee,Kuang-Long Lin.
Chapter 7-1 Signature Schemes.
Identity-based authenticated key agreement protocol based on Weil pairing N.P.Smart ELECTRONICS LETTERS 20 th June 2002 vol.38 No13 p Present by.
An Improved Smart Card Based Password Authentication Scheme with Provable Security Source:Computer Standards & Interfaces, Vol. 31, No. 4, pp ,
A more efficient and secure dynamic ID- based remote user authentication scheme Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan in Computer Communications.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Crypto Techniques for Authentication and Anonymous Payments
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
多媒體網路安全實驗室 A novel user authentication and privacy preserving scheme with smartcards for wireless communications 作者 :Chun-Ta Li,Cgeng-Chi Lee 出處 :Mathematical.
Efficient remote mutual authentication and key agreement Improvement of Chien et al. ’ s remote user authentication scheme using smart cards An efficient.
Computer Science CSC 774 Advanced Network Security Topic 2.6 ID Based Cryptography #2 Slides by An Liu.
An ID-Based Mutual Authentication and Key Exchange Protocol for Low- Power Mobile Devices Authors: Tsu-Yang Wu and Yuh-Min Tseng Source: The Computer Journal.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
Cryptanalysis and Improvement of an Access Control in User Hierarchy Based on Elliptic Curve Cryptosystem Reporter : Tzer-Long Chen Information Sciences.
Yu-Li Lin and Chien-Lung Hsu Department of Information Management, Chang-Gung University Information Science(SCI) Reporter: Tzer-Long Chen.
Center for Information Security Technologies ID-based Authenticated Key Exchange for Low-Power Mobile Devices K. Y. Choi, J. Y. Hwang, D. H. Lee CIST,
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Authentication of Signaling in VoIP Applications Authors: Srinivasan et al. (MIT Campus of Anna University, India) Source: IJNS review paper Reporter:
Linkability of Some Blind Signature Schemes Swee-Huay Heng 1, Wun-She Yap 1 Khoongming Khoo 2 1 Multimedia University, 2 DSO National Laboratories.
Department of Computer Engineering, Kyungpook National University Author : Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo Speaker : Wan-Soo Lee
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
A flexible biometrics remote user authentication scheme Authors: Chu-Hsing Lin and Yi-Yi Lai Sources: Computer Standards & Interfaces, 27(1), pp.19-23,
An Improved Efficient Secret Handshakes Scheme with Unlinkability Author: Jie Gu and Zhi Xue Source: IEEE Comm. Letters 15 (2) (2011) Presenter: Yu-Chi.
A new provably secure certificateless short signature scheme Authors: K.Y. Choi, J.H. Park, D.H. Lee Source: Comput. Math. Appl. (IF:1.472) Vol. 61, 2011,
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
Key Management Network Systems Security Mort Anvari.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Threshold password authentication against guessing attacks in Ad hoc networks ► Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing ► Ad Hoc Networks Volume: 5,
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
A Secure Authentication Scheme with Anonymity for Wireless Communications IEEE COMMUNICATIONS LETTERS, VOL. 12, NO. 10, OCTOBER 2008 Chia-Chun Wu, Wei-Bin.
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
Smart Card Based Authenticated Key Agreement Schemes
Non-PKI Methods for Public Key Distribution
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Source: The Journal of Systems and Software, Vol. 73, 2004, pp.507–514
An Introduction to Pairing Based Cryptography
Author:YongBin Zhou, ZhenFeng Zhang, and DengGuo Feng Presenter:戴士桀
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Boneh-Franklin Identity Based Encryption Scheme
Cryptographic Hash Function
CMSC 414 Computer and Network Security Lecture 15
Certificateless signature revisited
CS480 Cryptography and Information Security
SAKAWP: Simple Authenticated Key Agreement Protocol Based on Weil Pairing Authors: Eun-Jun Yoon and Kee-Young Yoo Src: International Conference on Convergence.
Security of a Remote Users Authentication Scheme Using Smart Cards
Identity-based deniable authentication protocol
An Introduction to Pairing Based Cryptography
Authors: Wei-Chi KU, Hao-Chuan TSAI, Maw-Jinn TSAUR
Public Key Infrastructure
The Application of Elliptic Curves Cryptography in Embedded Systems
Key Management Network Systems Security
Digital Signatures.
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
Practical Aspects of Modern Cryptography
Pairing based Mutual Authentication Scheme Using Smart Cards
Authors: Yuh-Min TSENG, Tsu-Yang WU, Jui-DiWU
A Note on Secure Key Issuing in ID-based Cryptography
II. REVIEW OF THE DAS ET AL. SCHEME
Secure Diffie-Hellman Algorithm
Privacy Protection for E-Health Systems by
Presentation transcript:

Improvement of recently proposed Remote User Authentication Schemes Guanfei Fang and Genxun Huang Science Institute of Information Engineering University, Zhengzhou, 450002, P.R.China feifgf@163.com Abstract Recently Manik et al. [13] proposed a novel remote user authentication scheme using bilinear pairings. Chou et al. [14] identified a weakness in Manik et al.’s scheme and made an improvement. Thulasi et al. [15] show that both Manik et al.’s and Chou et al.’s schemes are insecure against forgery attack and replay attack. But Thulasi et al. do not propose a improvement. In this paper, we propose an improvement to over come the flaws. Key Words:Authentication、Bilinear pairings、Smart Card、Password、Timestamp. Introduction Remote User Authentication scheme allows the authenticated user to login to the remote system to access the services offered. In 1981, Lamport [1] introduced the first well-known hash-based password authentication scheme. Recently, Manik et al. [13] proposed a remote user authentication scheme using bilinear pairings. In the scheme, they use Timestamps to avoid replay attacks while sending the authentication request over a public channel. But this is completely insecure as an adversary can use this information for illegal login later. Chou et al. [14] identified that the verification of Manik et al.’s scheme involves subtraction of two components, which are passed over the public channel leading to replay attack. One can do replay by adding same information to those two components, as it results in valid verification. To overcome replay attack, they suggested a modification in verification part of Manik et al.’s scheme, however Thulasi et al. [15] observed that the modified scheme also suffers from the replay attack. And they further point to more attacks on [13]. But they do not propose a improvement to over come the flaws, which lead to the insecurity of the schemes. In this paper, we cryptanalyze Manik et al.’s and Chou et al.’s schemes. And in the end, we propose an improvement to over come the flaws which Thulasi et al. found. The organization of the paper is as follows. In Section-2, we present the preliminaries of bilinear pairings. In Section-3 Manik et al.’s scheme is briefly reviewed. Chou et al.’s attack on Manik et al.’s scheme is reviewed in Section-4. In Section-5 Thulasi et al. attack on Chou et al.’s scheme and Manik et al.’s scheme is given. We improve Manik et al.’s scheme in Section-6. We concluded in Section-7. Bilinear Pairings

Let G1 be an additive cyclic group of prime order q and G2 be the multiplicative cyclic group of the same order. Practically we can think of G1 as a group of points on an elliptical curve over Zq , and G2 as a subgroup of the multiplicative group of a finite field Z*qk for some k∈Z*q . Let P be a generator of G1 . A bilinear pairing is a map e: G1 × G1→ G2 having the following three properties: Bilinear: e(aP, bQ)= e(P,Q)ab , for all P,Q∈G1 and ,ab∈Z*q . Non-degenerate: VP where P is not a generator, there exists Q∈G1 such that e(P,Q)1. Computable: e(P,Q) is computable in polynomial time. Discrete Logarithm Problem (DLP): Given two elements P,Q∈G1 find an integer a∈Z*q, such that Q = aP whenever such an integer exists. Computational Diffie-Hellman Problem (CDHP): Given (P, aP, bP) for any, ab∈Z*q, compute abP. Decisional Diffie-Hellman Problem (DDHP): Given (P, aP, bP, cP) for any a,b,c∈Z*q ,decide whether c = ab mod q. Gap Diffie-Hellman (GDH) group: G1 is a GDH group if there exists an efficient polynomial time algorithm which solves the DDHP in G1 and there is no probabilistic polynomial time algorithm which solves the CDHP in G1with non negligible probability of success. Bilinear Diffie-Hellman Problem (BDH): Given (P, aP, bP, cP) for any a, b, c∈Z*q, compute e(P,P)abc . 3. Review of Manik et al.’ scheme In this section, we briefly review Manik et al.’s scheme. This scheme consists of four phases. Registration phase; Login phase; Authentication phase; and Password change phase. The notations used through out the paper are as follows. U: User ID: Identity of the user PW: Password of user U RS: Remote Server H: {0, 1}* →G1 is a hash function. P is generator of G1 s is a secret key of RS PubRS = sP is public key of RS Suppose the remote system (RS) selects a secret key s and computes his public key as Pub RS =sP. Then, the RS publishes the system parameters (G1, G2, e, q, P, PubRS, H) and keeps s secret. Different phases work as follows Registration Phase U submits his identity ID and password PW to the RS RS computes Re gID = s.H(ID)+H(PW) RS personalizes smart card with ID, Re gID, H(.)and sends the smart card to U over a

secure channel. Login Phase User U inserts smart card in a terminal and submits ID and PW . Smart card computes DID = T.Re gID V = T.H(PW) Sends login request <ID, DID ,V ,T > to the RS over a public channel where T is the user system’s time stamp. Verification phase RS receives <ID, DID, V, T > at time T* and verifies the validity of the time interval between T* and T checking if (T* −T)≤ AT. It accepts the request and checks whether e(DID−V, P)= e(H(ID), Pub RS)T Password change phase User U inserts smart card into a terminal and submits his identity ID and password PW .Smart card verifies if this ID is same as the ID stored in the smart card. U submits a new password PW* .Smart card computes Re gID * =Re gID − H(PW) + H(PW *) = s. H(ID) +H (PW *) Smart card replaces the previously stored Re gID value by Re gID* Chou et al.’s attack on Manik et al.’s scheme Chou et al. [14] pointed that the verification in [13] e(DID−V, P)= e(H(ID), Pub RS)Tholds valid even when DID ′=DID +a and V ′=V +a where a∈G1, as shown below. e(DID−V, P)= e(DID+ a −V − a, P) = e(DID−V, P) = e(H(ID), Pub RS)T To avoid this, Chou et al [14] proposed different verification technique as e(DID,P)=e(TsH(ID)+V,P) to avoid the subtraction effect of [13]. Thulasi et al.’s attacks 5.1. On Chou et al.’s scheme The verification in [13] is modified by Chou et al. [14] as e(DID,P)=e(TsH(ID)+V,P). We note that this verification also holds valid for DID′=DID +a ′and V′=V +a ′ where a′∈G1, as shown below. e(DID′ ,P) = e(DID +a ′,P) = e(DID,P) e(a′ ,P) = e(TsH(ID)+V,P) e(a′ ,P) = e(TsH(ID)+V + a′, P) = e(TsH(ID)+ V′,P) Thus the approach of Chou et al., by adding V on the right side instead of left side, cannot solve the problem as shown above. 5.2. Further attacks on Manik et al.’s scheme Thulasi et al. further point to more attacks on [13]. Forgery attack

Given P and Ppub = sP , finding s is Discrete Logarithm Problem (DLP) but given x and xQ , it is feasible to compute Q. In login phase, the tuple <ID, DID, V, T > is being sent to RS over a public channel. Any adversary tapping this message can compute a valid <ID, DID′, V′, T′>. As DID =T.Re gID , where T∈Z*q V = T.H(PW), Attacker can compute T−1, Re gID and H(PW) as below. Re gID = T−1DID = T−1T.Re gID H(PW)= T−1V = T−1T.H(PW) Now, attacker can form the valid tuple <ID, DID′, V′, T ′> for time stamp T′ computing: DID ′=T ′.Re gID , V′= T′.H(PW). Weakness in Password Change Phase In the Password Change Phase, User submits ID, old password PW and new password PW* but there is no verification is done to validate the old password. So anyone knowing the ID and having the smart card can change the secret information Re gID in the smart card. 6. Our improvement We propose an improvement for the flaws in the Manik et al.’s scheme. The authentication scheme that we improve on is as follow: Registration Phase U submits his identity ID and password PW to the RS RS computes Re gID = s.H(ID). ΗPW = H(PW). RS personalizes smart card with ID, Re gID, ΗPW , H(.) and sends the smart card to U over a secure channel. Login Phase User U inserts smart card in a terminal and submits ID and PW . Smart card checks whether ΗPW = H(PW).if expression is right then Smart card computes: DID = T.Re gID ET= EPubRS [T]. where EPubRS is Public key encryption Sends login request < ID, DID, ET > to the RS over a public channel where T is the user system’s time stamp. Verification phase RS receives <ID, DID, ET > at time T* , first computes T = Es [ET]and verifies the validity of the time interval between T* and T checking if(T* −T)≤ ΔT. It accepts the request and checks whether e(DID, P)= e(H(ID), PubRS)T is hold.

Password change phase User U inserts smart card into a terminal and submits his identity ID and password PW .Smart card verifies if this ID and H(PW) are same as the ID and HPW stored in the smart card. U submits a new password PW* .Smart card computes: HPW* =H(PW *) Smart card replaces the previously stored HPW value by HPW* We prove the improved scheme is secure for the replay attack and forgery attack as following: Adversary can obtain the <ID, DID, ET > in login phase, but because the s is secrete, so the attacker want to get T from ET is same as figure out Discrete Logarithm Problem (DLP). Also the attacker want to get T from DID is same as figure out Discrete Logarithm Problem (DLP).Therefore the improvement is secure for forgery attack. 7. Conclusion In this paper, we analyzed both Manik et al.’s scheme and Chou et al.’s scheme. We propose an improvement for the flaws that Thulasi et al. found. And we prove the improved scheme is secure for the replay attack and forgery attack in the end. At the same time, we overcome the weakness in Password Change Phase. References L. Lamport, “Password Authentication with Insecure Communication”, Communications of the ACM, vol. 24, no. 11, pp 770-772, 1981. C. C. Chang and W. Y. Liao. “A remote password authentication scheme based upon ElGamal's signature scheme”, Computers & Security, vol. 13, no. 2, pp.137-144, 1994. D. P. Jablon. “Strong password-only authenticated key exchange”, ACM Computer Communications Review, vol.26, no. 5, pp.5-20, 1996. A. Shimizu, T. Horioka and H. Inagaki. “A Password Authentication Method for Contents Communications on the Internet”, IEICE Trans. On Commun., vol.E81-B, no. 8, pp.1666-1673, 1998. M. S. Hwang and L. H. Li. “A New Remote User Authentication Scheme Using Smart Cards”, IEEE Trans. On Consumer Electron., vol. 46, no.1, pp.28-30,2000. C. C. Lee, M. S. Hwang and W. P. Yang “A flexible remote user authentication scheme using smart cards”, ACM Operating Systems Review, vol. 36, no. 3, pp.46-52, 2002. T. C. Yeh, H. Y. Shen and J. J. Hwang. “A Secure One-Time Password Authentication Scheme Using Smart Cards”, IEICE Trans. on Commun.vol.E85-B, no. 11, pp. 2515-2518, 2002. C. C. Lee, L. H. Li, M. S. Hwang. “A Remote User Authentication Scheme Using Hash Functions”, ACM Operating Systems Review, vol. 36, no. 4, pp. 23- 29, 2002.

J. J. Shen, C. W. Lin, M. S. Hwang. “A Modified Remote User Authentication Scheme Using Smart Cards”, IEEE Trans. On Consumer Electron,vol. 49, no. 2,pp.414-416, 2003. A. K. Awasthi, S. Lal. “A Remote User Authentication Scheme Using Smart Cards with Forward Secrecy”, IEEE Trans. On Consumer Electron., vol.49,no. 4,pp.1246-1248, 2003. Manik. L. Das, Ashutosh Saxena and V. P. Gulati. “A Dynamic ID-based Remote User Authentication Scheme”, IEEE Trans. On Consumer Electron., vol. 50, no.2,pp.629-631, 2004. W. C. Ku. “A Hash-Based Strong-Password Authentication Scheme without Using Smart Cards”, ACM Operating Systems Review, vol. 38, no. 1, pp. 29-34,2004. Manik. L. Das, Ashutosh Saxena, V. P. Gulati, D. B. Phatak “A novel remote user authentication scheme using bilinear pairings”, Computers & Security (In Press),2005. J. S. Chou, Y. Chen, J. Y. Lin “Improvement of Manik et al.’s remote user authentication scheme”, http://eprint.iacr.org/2005/450.pdf G. Thulasi, Manik Lal Das, Ashutosh Saxena “Cryptanalysis of recently proposed Remote User Authentication Schemes”, http://eprint.iacr.org/2006/028.pdf