Computer and Information Security 期末報告 學號 92321501 姓名 莊玉麟.

Slides:



Advertisements
Similar presentations
多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 :JongHyup LEE 出處.
Advertisements

Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
A Secure Remote User Authentication Scheme with Smart Cards Manoj Kumar 報告者 : 許睿中 日期 :
A simple remote user authentication scheme 1. M. S. Hwang, C. C. Lee and Y. L. Tang, “A simple remote user authentication.
電子商務與數位生活研討會 1 Further Security Enhancement for Optimal Strong-Password Authentication Protocol Tzung-Her Chen, Gwoboa Horng, Wei-Bin Lee,Kuang-Long Lin.
A password authentication scheme with secure password updating SEC 期末報告 學號: 姓名:翁玉芬.
1 Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment Authors : Han-Cheng Hsiang and Wei-Kuan Shih.
孫國偉 Efficient Password authenticated key agreement using smart cards Author : Wen-Shenq Juang* Date : in Computers & Security.
1 An ID-based multisignature scheme without reblocking and predetermined signing order Chin-Chen Chang, Iuon-Chang Lin, and Kwok-Yan Lam Computer Standards.
An Improved Smart Card Based Password Authentication Scheme with Provable Security Source:Computer Standards & Interfaces, Vol. 31, No. 4, pp ,
A more efficient and secure dynamic ID- based remote user authentication scheme Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan in Computer Communications.
1 Hidden Exponent RSA and Efficient Key Distribution author: He Ge Cryptology ePrint Archive 2005/325 PDFPDF 報告人:陳昱升.
Chapter 3 Encryption Algorithms & Systems (Part C)
Improvement of Hwang-Lo-Lin scheme based on an ID-based cryptosystem No author given (Korea information security Agency) Presented by J.Liu.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.5 Public Key Algorithms.
Computer Science Public Key Management Lecture 5.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
Digital Signatures (DSs) The digital signatures cannot be separated from the message and attached to another The signature is not only tied to signer but.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Lect. 15 : Digital Signatures RSA, ElGamal, DSA, KCDSA, Schnorr.
The RSA Algorithm Rocky K. C. Chang, March
多媒體網路安全實驗室 A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks Date:2011/10/05 報告人:向峻霈.
A Risk Analysis Approach for Biometric Authentication Technology Author: Arslan Brömme Submission: International Journal of Network Security Speaker: Chun-Ta.
1 Authentication and Digital Signature Schemes and Their Applications to E-commerce ( 身份認證與數位簽章技術及其在電子商務上的應用 ) Advisor: Chin-Chen Chang 1, 2 Student: Ya-Fen.
An Authenticated Payword Scheme without Public Key Cryptosystems Author: Chia-Chi Wu, Chin-Chen Chang, and Iuon-Chang Lin. Source: International Journal.
多媒體網路安全實驗室 A novel user authentication and privacy preserving scheme with smartcards for wireless communications 作者 :Chun-Ta Li,Cgeng-Chi Lee 出處 :Mathematical.
Efficient remote mutual authentication and key agreement Improvement of Chien et al. ’ s remote user authentication scheme using smart cards An efficient.
Topic 22: Digital Schemes (2)
Fall 2004/Lecture 201 Cryptography CS 555 Lecture 20-b Zero-Knowledge Proof.
How to Update Documents Verifiably in Searchable Symmetric Encryption Kaoru Kurosawa and Yasuhiro Ohtaki Ibaraki University, Japan.
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
Yu-Li Lin and Chien-Lung Hsu Department of Information Management, Chang-Gung University Information Science(SCI) Reporter: Tzer-Long Chen.
A Secure Identification and Key Agreement Protocol with User Anonymity (SIKA) Authors: Kumar Mangipudi and Rajendra Katti Source: Computers & Security,
1 一個新的代理簽章法 A New Proxy Signature Scheme 作 者 : 洪國寶, 許琪慧, 郭淑娟與邱文怡 報 告者 : 郭淑娟.
Department of Computer Engineering, Kyungpook National University Author : Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo Speaker : Wan-Soo Lee
多媒體網路安全實驗室 Robust authentication and key agreement scheme preserving Date:2011/11/05 報告人:向峻霈 出處 : Ren-Chiun Wang Wen-Shenq Juang Chin-Laung Lei Computer.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
SPEAKER: HONG-JI WEI DATE: Secure Anonymous Authentication Scheme with Roaming for Mobile Networks.
A A E E D D C C B B # Symmetric Keys = n*(n-1)/2 F F
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 14 October 5, 2004.
Prepared by Dr. Lamiaa Elshenawy
A flexible biometrics remote user authentication scheme Authors: Chu-Hsing Lin and Yi-Yi Lai Sources: Computer Standards & Interfaces, 27(1), pp.19-23,
A new provably secure certificateless short signature scheme Authors: K.Y. Choi, J.H. Park, D.H. Lee Source: Comput. Math. Appl. (IF:1.472) Vol. 61, 2011,
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
COM 5336 Lecture 8 Digital Signatures
Threshold password authentication against guessing attacks in Ad hoc networks ► Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing ► Ad Hoc Networks Volume: 5,
多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 : Xiong Li, Yongping.
多媒體網路安全實驗室 An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security Date:2012/02/16.
Threshold password authentication against guessing attacks in Ad hoc networks Authors: Zhenchuan Chai, Zhenfu Cao, Rongxing Lu Sources: Ad Hoc Networks,
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
A Secure Authentication Scheme with Anonymity for Wireless Communications IEEE COMMUNICATIONS LETTERS, VOL. 12, NO. 10, OCTOBER 2008 Chia-Chun Wu, Wei-Bin.
Source: The Journal of Systems and Software, Vol. 73, 2004, pp.507–514
Key Substitution Attacks on Some Provably Secure Signature Schemes
Author : Guilin Wang Source : Information Processing Letters
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Cryptanalysis on Mu–Varadharajan's e-voting schemes
Efficient password authenticated key agreement using smart cards
Security of a Remote Users Authentication Scheme Using Smart Cards
Authors: Wei-Chi KU, Hao-Chuan TSAI, Maw-Jinn TSAUR
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
A lightweight biometrics based remote user authentication scheme for IoT services Source: Journal of Information Security and Applications Volume 34, Part.
Authors: Yuh-Min TSENG, Tsu-Yang WU, Jui-DiWU
CSC 774 Advanced Network Security
Improvement of Chien et al
Biometrics-based RSA Cryptosystem for Securing Real-Time Communication
Presentation transcript:

Computer and Information Security 期末報告 學號 姓名 莊玉麟

Attacks on the (enhanced) Yang-Shieh authentication Author: Ke-Fei Chen, Sheng Zhong Source: Computers and Security, Volume: 22, Issue: 8, December, 2003, pp Speaker: Yu-Lin Chuang

Outline Yang-Shieh’s scheme(1999/12) Chan-Cheng’s attack(2002/1) Chen’s attack(2003/12) Conclusion

Yang-Shieh ’ s Scheme Registration phase : KIC (Key Information Center) 1. Generates primes p, q, and n=pq 2. ed=1 (mod (p-1)(q-1)), e is a prime and d is a int. 3. Find a primitive element g in GF(p) and GF(q) 4. S i =ID i d mod n 5. Generates CID i and h i =g PW i ×d mod n 6. Public: n, e, g ; only KIC know: p, q, d 7. Write n, e, g, ID i, CID i, S i, h i to smart card U i : user ID i : user’s identity PW i : chosen password

New user Ui submits IDi and PWi to KIC ID i, PW i Generate p, q, and n=pq Prime number e and an integer d ed=1(mod(p-1)(q-1)) Find an integer g in GF(p) and GF(q) User iKIC S i =ID i d mod n Generate CID i and computes h i =g PW i ×d mod n n, e, g, ID i, CID i, S i, h i Smart Card

Login phase : 1. Key in ID i and PW i 2. Generates a random number r i 3. M = {ID i, CID i, X i, Y i, n, e, g, T} X i =g r i ×PW i mod n Y i =S i × h i r i ×f(CID i,T) mod n Where T is the current time used as a timestamp and f(x,y) is a one-way hash function

Verify phase : 1. Verify ID i and CID i 2. Check T and T’ 3. Check Y i e mod n = ID i × X i f(CID i,T) mod n

Login and Verify phase Key in ID i and PW i ID i, CID i, X i, Y i, n, e, g, T Check ID i and CID i Check T and T’ Y i e mod n = ID i × X i f(CID i,T) mod n Smart cardRemote system Random number r i X i =g r i × PW i mod n Y i =S i × h i r i × f(CID i,T) mod n

Yang-Shieh ’ s Scheme Y i e mod n = ID i × X i f(CID i,T) mod n Y i = S i × h i r i × f(CID i,T) mod n = ID i d × g PW i × d × r i × f(CID i,T) mod n (S i = ID i d mod n, h i =g PW i × d mod n) X i =g r i × PW i mod n

Chan-Cheng’s attack ID f = Y i e mod n X f = Y i e mod n ID f, CID i, X f, Y f, n, e, g, T c Check ID f and CID i Check T c and T c ’ Y f e mod n = ID f × X f f(CID i,T c ) mod n Smart cardRemote system Y f =Y i × Y i f(CID i,T c ) mod n

Fan et al.’s attack Random number r, k ID f = r e mod n X f = k e mod n ID f, CID i, X f, Y f, n, e, g, T c Check ID f and CID i Check T c and T c ’ Y f e mod n = ID f × X f f(CID i,T c ) mod n Smart cardRemote system Y f = rk f(CID i,T c ) mod n

Fan et al. ’ s Improvement RSA should be 1024 bits ID i range between 1 and 2 27 - 1

Chen ’ s attacks If e < 27, choose X f =1, Y f =2, and ID f =Y f e Y f e = ID f × X f f(CID i,T) (mod n) ID f =2 e [1, 2 27 - 1]

Chen ’ s attacks (cont.) If e ≧ Pick a valid CID j at random 2. Extended Euclidean algorithm: gcd(e,f(CID j, T)) 3. If gcd(e,f(CID j, T))=1, let a × e + b × f(CID j,T) = 1, else go to step 1 4. Y f = ID i a mod n X f = ID i -b mod n M={ID i, CID j, X f, Y f, n, e, g, T}

Chen ’ s attacks (cont.) Y f e =ID i a × e (mod n) =ID i 1-b × f(CID j, T) (mod n) =ID i × (ID i -b ) f(CID j, T) (mod n) =ID i (X f ) f(CID j, T) (mod n) Y f = ID i a mod n X f = ID i -b mod n a×e + b×f(CID j, T) = 1

Conclusions Cannot fix the scheme by adding a simple restriction on the range of the smart card identifiers Pick T slightly ahead of the current time