多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 :JongHyup LEE 出處.

Slides:



Advertisements
Similar presentations
Anonymity without Sacrificing Performance Enhanced Nymble System with Distributed Architecture CS 858 Project Presentation Omid Ardakanian * Nam Pham *
Advertisements

1 東南技術學院九十二學年度第二學期 資工系第一次論文發表會 Analysis of an Improved Version of S/KEY One-Time Password Authentication Scheme Speaker: Maw-Jinn Tsaur
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
多媒體網路安全實驗室 Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Date : Reporter : Hong Ji Wei Authors.
多媒體網路安全實驗室 Source:International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH- MSP),2010 Sixth. Authors:Hsiang-Cheh.
多媒體網路安全實驗室 Towards Secure and Effective Utilization over Encrypted Cloud Data 報告人 : 葉瑞群 日期 :2012/05/09 出處 :IEEE Transactions on Knowledge and Data Engineering.
A Secure Remote User Authentication Scheme with Smart Cards Manoj Kumar 報告者 : 許睿中 日期 :
Computer and Information Security 期末報告 學號 姓名 莊玉麟.
A simple remote user authentication scheme 1. M. S. Hwang, C. C. Lee and Y. L. Tang, “A simple remote user authentication.
A Server-aided Signature Scheme Based on Secret Sharing for Mobile Commerce Source: Journal of Computers, Vol.19, No.1, April 2008 Author: Chin-Ling Chen,
電子商務與數位生活研討會 1 Further Security Enhancement for Optimal Strong-Password Authentication Protocol Tzung-Her Chen, Gwoboa Horng, Wei-Bin Lee,Kuang-Long Lin.
Efficient fault-tolerant scheme based on the RSA system Author: N.-Y. Lee and W.-L. Tsai IEE Proceedings Presented by 詹益誌 2004/03/02.
1 Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment Authors : Han-Cheng Hsiang and Wei-Kuan Shih.
Efficient Multi-server Password Authenticated Key Agreement Using Smart Cards Computer and Information Security Ming-Hong Shih.
孫國偉 Efficient Password authenticated key agreement using smart cards Author : Wen-Shenq Juang* Date : in Computers & Security.
1 電子商務代理人與無線射頻系統上安全設計之研究 The Study of Secure Schemes on Agent-based Electronic Commerce Transaction and RFID system 指導教授 : 詹進科 教授 (Prof. Jinn-Ke Jan) 陳育毅.
An Improved Smart Card Based Password Authentication Scheme with Provable Security Source:Computer Standards & Interfaces, Vol. 31, No. 4, pp ,
A more efficient and secure dynamic ID- based remote user authentication scheme Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan in Computer Communications.
多媒體網路安全實驗室 A Strong User Authentication Framework for Cloud Computing Date : Reporter : Hong Ji Wei Authors : Amlan Jyoti Choudhury, Mangal.
多媒體網路安全實驗室 A Security Framework of Group Location-Based Mobile Applications in Cloud Computing Date : Reporter : Hong Ji Wei Authors : Yu-Jia.
多媒體網路安全實驗室 A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks Date:2011/10/05 報告人:向峻霈.
Cryptanalysis of Two Dynamic ID-based Authentication
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
1 Authentication and Digital Signature Schemes and Their Applications to E-commerce ( 身份認證與數位簽章技術及其在電子商務上的應用 ) Advisor: Chin-Chen Chang 1, 2 Student: Ya-Fen.
多媒體網路安全實驗室 A novel user authentication and privacy preserving scheme with smartcards for wireless communications 作者 :Chun-Ta Li,Cgeng-Chi Lee 出處 :Mathematical.
Efficient remote mutual authentication and key agreement Improvement of Chien et al. ’ s remote user authentication scheme using smart cards An efficient.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
多媒體網路安全實驗室 Protecting the Privacy of Users in e-Commerce Environment Date: Reporter:Chien-Wen Huang Author: Chun-Hua Chen and Gwoboa Horng 出處:
Cryptanalysis and Improvement of an Access Control in User Hierarchy Based on Elliptic Curve Cryptosystem Reporter : Tzer-Long Chen Information Sciences.
A Secure Identification and Key Agreement Protocol with User Anonymity (SIKA) Authors: Kumar Mangipudi and Rajendra Katti Source: Computers & Security,
1 Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards 使用在 smart cards 的強韌及高效率密碼驗證金鑰協定 IEEE Transactions on Industrial Electronics,
Authentication of Signaling in VoIP Applications Authors: Srinivasan et al. (MIT Campus of Anna University, India) Source: IJNS review paper Reporter:
1 一個新的代理簽章法 A New Proxy Signature Scheme 作 者 : 洪國寶, 許琪慧, 郭淑娟與邱文怡 報 告者 : 郭淑娟.
多媒體網路安全實驗室 Certificateless multi-proxy signature Date:2011/04/08 報告人:向峻霈 出處 : Zhengping Jin, Qiaoyan Wen: Computer Communications, pp ,2011.
Department of Computer Engineering, Kyungpook National University Author : Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo Speaker : Wan-Soo Lee
多媒體網路安全實驗室 Ontological recommendation multi-agent for Tainan City travel Date : Speaker : Hong Ji Wei Authors : Chang-Shing, Lee,Young-Chung.
多媒體網路安全實驗室 Robust authentication and key agreement scheme preserving Date:2011/11/05 報告人:向峻霈 出處 : Ren-Chiun Wang Wen-Shenq Juang Chin-Laung Lei Computer.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
SPEAKER: HONG-JI WEI DATE: Secure Anonymous Authentication Scheme with Roaming for Mobile Networks.
多媒體網路安全實驗室 Mobility Assisted Secret Key Generation Using Wireless Link Signatures Date: Reporter : Hong Ji Wei Auther : Junxing Zhang Kasera,
多媒體網路安全實驗室 Anonymous ID Signature Scheme with Provable Identity Date: Reporter :Chien-Wen Huang 出處: 2008 Second International Conference on Future.
多媒體網路安全實驗室 Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments Date:2011/05/05 報告人:向峻霈 出處 : Jalal Al-Muhtadi,
A flexible biometrics remote user authentication scheme Authors: Chu-Hsing Lin and Yi-Yi Lai Sources: Computer Standards & Interfaces, 27(1), pp.19-23,
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
多媒體網路安全實驗室 Practical Searching Over Encrypted Data By Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: GLOBECOM 2010, 2010 IEEE.
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
多媒體網路安全實驗室 Source: IEICE Trans. Fundamentals, Vol. E90-A, No. 4, April 2007, pp Authors:Hong Lin Jin, Masaaki Fujiyoshi, Hitoshi Kiya Speaker:Cheng.
Threshold password authentication against guessing attacks in Ad hoc networks ► Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing ► Ad Hoc Networks Volume: 5,
多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 : Xiong Li, Yongping.
多媒體網路安全實驗室 Private Information Retrieval Scheme Combined with E- Payment in Querying Valuable Information Date: Reporter: Chien-Wen Huang 出處:
多媒體網路安全實驗室 An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security Date:2012/02/16.
Threshold password authentication against guessing attacks in Ad hoc networks Authors: Zhenchuan Chai, Zhenfu Cao, Rongxing Lu Sources: Ad Hoc Networks,
A Secure and Efficient Application Download Architecture in 3G Mobile Environment Speaker: Kuo-Zhe Chiou Laboratory of Cryptography and Information Security.
多媒體網路安全實驗室 A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks Date:2011/10/12 報告人:向峻霈.
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
無線環境的認證方法及其在電子商務應用之研究
Author:YongBin Zhou, ZhenFeng Zhang, and DengGuo Feng Presenter:戴士桀
A lightweight authentication scheme based on self-updating strategy for space information network Source: International Journal Of Satellite Communications.
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Efficient password authenticated key agreement using smart cards
By Hyun-Chul Kim, Hong-Woo Lee, Kyung-Seok Lee, Moon-Seog Jun
An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems.
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
Improvement of Chien et al
Privacy Protection for E-Health Systems by
Presentation transcript:

多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 :JongHyup LEE 出處 :2011 Elsevier Journal of Network and Computer Applications 報告人 : 陳鈺惠 日期 :2013/12/04

多媒體網路安全實驗室 Outline Introduction 1 Overview of Sood et al.’s scheme 2 Proposed scheme 43 2 Protocol analysis 34 Conclusion 45

多媒體網路安全實驗室 1.Introduction(1/1)  With the rapid development of the Internet and electronic commerce technology, many services are provided through the Internet such as online shopping, online game.  This paper propose an efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards to tackle these problems. 3

多媒體網路安全實驗室 2.Overview of Sood et al.’s scheme UiUi The ith user SkSk The kth service providing server CSThe control server ID i The identity of the user U i PiPi The password of the user U i SID k The identity of the server S k yiyi The random number chosen by CS for user U i xThe master secret key maintained by CS bA random number chosen by the user for registration CID i The dynamic identity generated by the user U i for authentication SKA session key shared among the user, the service providing server and the CS N i1 A random number generated by the user U i 's smart card N i2 A random number generated by the server S k for the user U i N i3 A random number generated by the CS for the user U i h(·)A one-way hash function ⊕ Exclusive-OR operation ∥ Message concatenation operation 4

多媒體網路安全實驗室 2.Overview of Sood et al.’s scheme(1/8) Registration phase U i S k CS A i =h(ID i ||b) B i =h(b ⊕ P i ) A i 、 B i F i = A i ⊕ y i G i =B i ⊕ h(y i ) ⊕ h(x) C i =A i ⊕ h(y i ) ⊕ x (F i 、 G i 、 h(·)) Stores (C i 、 y i ⊕ x) Smart card D i =b ⊕ h(ID i ||P i ) E i =h(ID i ||P i ) ⊕ P i Smart card(D i 、 E i 、 F i 、 G i 、 h(·)) (SID k 、 SK k ) Stores(SID k 、 SK k ⊕ h(x||SID k )) 5

多媒體網路安全實驗室 2.Overview of Sood et al.’s scheme(2/8) Login phase U i S k CS ID i * P i * Smart card E i *=h(ID i *||P i *) ⊕ P i * E i *=E i ? b=D i ⊕ h(ID i ||P i ) , A i =h(ID i ||b) B i =h(b ⊕ P i ) , y i =F i ⊕ A i h(x)=G i ⊕ B i ⊕ h(y i ) , Z i =h 2 (x) ⊕ N i1 CID i =A i ⊕ h(y i ) ⊕ h(x) ⊕ N i1 M i =h(h(x)||y i ||SID k ||N i1 ) (SID k 、 Z i 、 CID i 、 M i ) 6

多媒體網路安全實驗室 2.Overview of Sood et al.’s scheme(3/8) Authentication and session key agreement phase U i S k CS R i =N i2 ⊕ SK k (SID k 、 Z i 、 CID i 、 M i 、 R i ) N i1 =Z i ⊕ h 2 (x) , N i2 =R i ⊕ SK k C i *=CID i ⊕ N i1 ⊕ h(x) ⊕ x C i *=C i ? , extracts y i M i *=h(h(x)||y i ||SID k ||N i1 ) M i *=M i ? K i =N i 1 ⊕ N i3 ⊕ h(SK k ||N i2 ) X i =h(ID i ||y i ||N i1 ) ⊕ h(N i1 ⊕ N i2 ⊕ N i3 ) V i =h[h(N i1 ⊕ N i2 ⊕ N i3 )||h(ID i ||y i ||N i1 )] T i =N i2 ⊕ N i3 ⊕ h(y i ||ID i| |h(x)||N i1 ) (K i 、 X i 、 V i 、 T i ) 7

多媒體網路安全實驗室 2.Overview of Sood et al.’s scheme(4/8) Authentication and session key agreement phase U i S k CS N i1 ⊕ N i3 =K i ⊕ h(SK k ||N i2 ) h(ID i ||y i ||N i1 )=X i ⊕ h(N i1 ⊕ N i2 ⊕ N i3 ) V i *=h[h(N i1 ⊕ N i2 ⊕ N i3 )||h(ID i ||y i ||N i1 )] V i *=V i ? (V i 、 T i ) N i2 ⊕ N i3 T i ⊕ h(y i ||ID i ||h(x)||N i1 ) V i *=h[h(N i1 ⊕ N i2 ⊕ N i3 )||h(ID i ||y i ||N i1 )] V i *=V i ? SK=h(h(ID i ||y i ||N i1 )||(N i1 ⊕ N i2 ⊕ N i3 )) 8

多媒體網路安全實驗室 2.Overview of Sood et al.’s scheme(5/8) Leak-of-verifier attack User have(D k 、 E k 、 F k 、 G k 、 h(·)) 、 ID k 、 P k User can compute b k =D k ⊕ h(ID k ||P k ) A k =h(ID k ||b) y k =F k ⊕ A k B k =h(b ⊕ P k ) h(x)=G k ⊕ B k ⊕ h(y k ) Get y k 、 h(x) If client leaked y i ⊕ x 、 Ci=Ai ⊕ h(y i ) ⊕ x U k get x 、 h(x) 、 y i ⊕ x from y k then get y i 、 A i and h(x) U k login 9

多媒體網路安全實驗室 2.Overview of Sood et al.’s scheme(6/8) Leak-of-verifier attack U k get random number N i ′ 1 Compute CID′ i =A i ⊕ h(y i ) ⊕ h(x) ⊕ N i ′ 1 M′ i =h(h(x)||y i ||SID j ||N i ′ 1 ) Z′ i =h 2 (x) ⊕ N i ′ 1 U k submits the login request message (SID j 、 Z′ i 、 CID′ i 、 M′ i ) to S j S j get random number N i ′ 2 Compute R i =N i2 ⊕ SK j submits to CS Compute N i1 =Z′ i ⊕ h 2 (x) 、 N i2 =R i ⊕ SK j C* i =CID′ i ⊕ N i ′ 1 ⊕ h(x) ⊕ x=A i ⊕ h(y i ) ⊕ x=C i CS compute M i *=h(h(x)||y i ||SID j ||N i ′ 1 )=M′ i U k get y i ⊕ x 、 C i =A i ⊕ h(y i ) ⊕ x 10

多媒體網路安全實驗室 2.Overview of Sood et al.’s scheme(7/8) Stolen smart card attack If (SID j 、 Z i 、 CID i 、 M i ) was eavesdropped and previously valid login U k compute N i1 =Z′ i ⊕ h 2 (x) A i ⊕ h(y i )=CID i ⊕ N i1 ⊕ h(x) U k extract (D i 、 E i 、 F i 、 G i 、 h(·)) Compute b i ⊕ P i =D i ⊕ E i h(b i ⊕ P i )=B i h(y i )=G i ⊕ B i ⊕ h(x) Compute A i ⊕ h(y i ) ⊕ (A i ⊕ h(y i )) Get y i =F i ⊕ A i U k get h(x) 、 y i 11

多媒體網路安全實驗室 2.Overview of Sood et al.’s scheme(8/8) Incorrect authentication and session key agreement phase In registration phase , U i submits A i 、 B i rather than true identity ID i to CS 。 But in step4 X i =h(ID i ||y i ||N i1 ) ⊕ h(N i ⊕ N i2 ⊕ N i3 ) V i =h[h(N i1 ⊕ N i2 ⊕ N i3 )||h(ID i ||y i ||N i1 )] T i =N i2 ⊕ N i3 ⊕ h(y i ||ID i ||h(x)||N i1 ) 12

多媒體網路安全實驗室 13 UiUi The ith user SjSj The service providing server CSThe control server ID i The identity of the user U i PiPi The password of the user U i SID k The identity of the server S k yiyi The random number chosen by CS for user U i xThe master secret key maintained by CS bA random number chosen by the user for registration CID i The dynamic identity generated by the user U i for authentication SKA session key shared among the user, the service providing server and the CS N i1 A random number generated by the user U i 's smart card N i2 A random number generated by the server S k for the user U i N i3 A random number generated by the CS for the user U i h(·)A one-way hash function ⊕ Exclusive-OR operation ∥ Message concatenation operation

多媒體網路安全實驗室 3.Proposed scheme(1/4) Registration phase U i S j CS Chooses ID i 、 P i 、 b A i =h(b||P i ) (ID i 、 A i ) B i =h(ID||x) , C i =h(ID i ||h(y)||A i ) D i =B i ⊕ h(ID i ||A i ) , E i =B i ⊕ h(y||x) (C i 、 D i 、 E i 、 h(·) 、 h(y)) Smart card U i enter b to smart card smart card stores (C i 、 D i 、 E i 、 h(·) 、 h(y) 、 b) 14

多媒體網路安全實驗室 3.Proposed scheme(2/4) Login phase U i S j CS Inputs ID i 、 P i smart card computes A i =h(b||P i ) , C i ′=(ID i ||h(y)||A i ) C i ′=C i ? Smart card generates N i1 B i =D i ⊕ h(ID i ||A i ) , F i =h(y) ⊕ N i1 P ij =E i ⊕ h(h(y)||N i1 ||SID j ) CID i =A i ⊕ h(B i ||F i ||N i1 ) G i =h(B i ||A i ||N i1 ) (F i 、 G i 、 P ij 、 CID i ) 15

多媒體網路安全實驗室 3.Proposed scheme(3/4) Authentication and session key agreement phase U i S j CS S j chooses N i2 K i =h(SID j ||y) ⊕ N i2 M i =h(h(x||y)||N i2 )) (F i 、 G i 、 P ij 、 CID i 、 SID j 、 K i 、 M i ) N i2 =K i ⊕ h(SID j ||y) M i ′=h(h(x||y)||N i2 ) , M i ′=M i ? N i1 =F i ⊕ h(y) B i =P ij ⊕ h(h(y)||N i1 ||SID j ) ⊕ h(y||x) A i =CID i ⊕ h(B i ||F i ||N i1 ) G i ′=h(B i ||A i ||N i1 ) , G i ′=G i ? CS generates N i3 Q i =N i1 ⊕ N i3 ⊕ h(SID j ||N i2 ) R i =h(A i ||B i ) ⊕ h(N i1 ⊕ N i2 ⊕ N i3 ) V i =h(h(A i ||B i )||h(N i1 ⊕ N i2 ⊕ N i3 )) T i =N i2 ⊕ N i3 ⊕ h(A i ||B i ||N i1 ) 16

多媒體網路安全實驗室 3.Proposed scheme(4/4) Authentication and session key agreement phase U i S j CS (Q i 、 R i 、 V i 、 T i ) N i1 ⊕ N i3 =Q i ⊕ h(SID j ||N i2 ) h(A i ||B i )=R i ⊕ h(N i1 ⊕ N i3 ⊕ N i2 ) V i ′=h(h(A i ||B i )||h(N i1 ⊕ N i3 ⊕ N i2 ) V i ′=V i ? (V i 、 T i ) N i2 ⊕ N i3 =T i ⊕ h(A i ||B i ||N i1 ) V i ′=h(h(A i ||B i )||h(N i2 ⊕ N i3 ⊕ N i1 )) V i ′=V i ? SK=h(h(A i ||B i )||(N i1 ⊕ N i2 ⊕ N i3 )) 17

多媒體網路安全實驗室 4.Protocol analysis 18

多媒體網路安全實驗室 5.Conclusion  This paper can satisfy all the essential requirements for multi-server architecture authentication.  Compared with Sood et al.'s (2011) protocol and other related protocols, our proposed protocol keeps the efficiency and is more secure. Therefore, our protocol is more suitable for the practical applications. 19

多媒體網路安全實驗室