A simple remote user authentication scheme 1. M. S. Hwang, C. C. Lee and Y. L. Tang, “A simple remote user authentication.

Slides:



Advertisements
Similar presentations
1 東南技術學院九十二學年度第二學期 資工系第一次論文發表會 Analysis of an Improved Version of S/KEY One-Time Password Authentication Scheme Speaker: Maw-Jinn Tsaur
Advertisements

多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 :JongHyup LEE 出處.
Kerberos Assisted Authentication in Mobile Ad-hoc Networks Authors: Asad Amir Pirzada and Chris McDonald Sources: Proceedings of the 27th Australasian.
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
1 Secure Credit Card Transactions on an Untrusted Channel Source: Information Sciences in review Presenter: Tsuei-Hung Sun ( 孫翠鴻 ) Date: 2010/9/24.
P RIVACY -P RESERVING A UTHENTICATION OF U SERS WITH S MART C ARDS U SING O NE -T IME C REDENTIALS Author: Jun-Cheol PARK Source: IEICE TRANS. INF&SYST.
A Secure Remote User Authentication Scheme with Smart Cards Manoj Kumar 報告者 : 許睿中 日期 :
Computer and Information Security 期末報告 學號 姓名 莊玉麟.
An Authentication Scheme for Mobil Satellite Communication Systems Advisor: Prof. Jen-Chang Liu Graduate Student: Yi-Ching Chen( 陳怡靜 ) Date: 2004/05/26.
電子商務與數位生活研討會 1 Further Security Enhancement for Optimal Strong-Password Authentication Protocol Tzung-Her Chen, Gwoboa Horng, Wei-Bin Lee,Kuang-Long Lin.
A password authentication scheme with secure password updating SEC 期末報告 學號: 姓名:翁玉芬.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
1 Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment Authors : Han-Cheng Hsiang and Wei-Kuan Shih.
Efficient Multi-server Password Authenticated Key Agreement Using Smart Cards Computer and Information Security Ming-Hong Shih.
孫國偉 Efficient Password authenticated key agreement using smart cards Author : Wen-Shenq Juang* Date : in Computers & Security.
An Improved Smart Card Based Password Authentication Scheme with Provable Security Source:Computer Standards & Interfaces, Vol. 31, No. 4, pp ,
A more efficient and secure dynamic ID- based remote user authentication scheme Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan in Computer Communications.
1 Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing From : ePrint (August 2005) Author : Junghyun Nam, Seungjoo.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
多媒體網路安全實驗室 A Strong User Authentication Framework for Cloud Computing Date : Reporter : Hong Ji Wei Authors : Amlan Jyoti Choudhury, Mangal.
1 Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards Authors: W.C Ku, S.T. Chang,and M.H. Chiang Source: Electronics.
多媒體網路安全實驗室 A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks Date:2011/10/05 報告人:向峻霈.
Cryptanalysis of Two Dynamic ID-based Authentication
多媒體網路安全實驗室 A novel user authentication and privacy preserving scheme with smartcards for wireless communications 作者 :Chun-Ta Li,Cgeng-Chi Lee 出處 :Mathematical.
Efficient remote mutual authentication and key agreement Improvement of Chien et al. ’ s remote user authentication scheme using smart cards An efficient.
Chapter 21 Distributed System Security Copyright © 2008.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
A Secure Identification and Key Agreement Protocol with User Anonymity (SIKA) Authors: Kumar Mangipudi and Rajendra Katti Source: Computers & Security,
1 Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards 使用在 smart cards 的強韌及高效率密碼驗證金鑰協定 IEEE Transactions on Industrial Electronics,
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks Hyeran Mun, Kyusuk Han, Yan Sun Lee, Chan Yeob Yeun, Hyo.
Department of Computer Engineering, Kyungpook National University Author : Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo Speaker : Wan-Soo Lee
多媒體網路安全實驗室 Robust authentication and key agreement scheme preserving Date:2011/11/05 報告人:向峻霈 出處 : Ren-Chiun Wang Wen-Shenq Juang Chin-Laung Lei Computer.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
SPEAKER: HONG-JI WEI DATE: Secure Anonymous Authentication Scheme with Roaming for Mobile Networks.
Password-only Authenticated Key Agreement Protocols Based on Self-certified Approach Tzong-Chen Wu and Yen-Ching Lin Department of Information Management.
A flexible biometrics remote user authentication scheme Authors: Chu-Hsing Lin and Yi-Yi Lai Sources: Computer Standards & Interfaces, 27(1), pp.19-23,
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
RSA-based password authenticated key exchange protocol Presenter: Jung-wen Lo( 駱榮問 )
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
Threshold password authentication against guessing attacks in Ad hoc networks ► Chai, Zhenchuan; Cao, Zhenfu; Lu, Rongxing ► Ad Hoc Networks Volume: 5,
多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 : Xiong Li, Yongping.
Threshold password authentication against guessing attacks in Ad hoc networks Authors: Zhenchuan Chai, Zhenfu Cao, Rongxing Lu Sources: Ad Hoc Networks,
A Secure Authentication Scheme with Anonymity for Wireless Communications IEEE COMMUNICATIONS LETTERS, VOL. 12, NO. 10, OCTOBER 2008 Chia-Chun Wu, Wei-Bin.
Smart Card Based Authenticated Key Agreement Schemes
Non-PKI Methods for Public Key Distribution
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
A lightweight authentication scheme based on self-updating strategy for space information network Source: International Journal Of Satellite Communications.
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Cryptanalysis on Mu–Varadharajan's e-voting schemes
A secure and traceable E-DRM system based on mobile device
Source : Future Generation Computer Systems, Vol. 68, pp , 2017
Efficient password authenticated key agreement using smart cards
A robust and anonymous patient monitoring system using wireless medical sensor networks Source: Future Generation Computer Systems, Available online 8.
Security of a Remote Users Authentication Scheme Using Smart Cards
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Wei-Chi KU, Hao-Chuan TSAI, Maw-Jinn TSAUR
Recent Developments on Multimedia and Secure Networking Technologies
By Hyun-Chul Kim, Hong-Woo Lee, Kyung-Seok Lee, Moon-Seog Jun
Strong Password Authentication Protocols
An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems.
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Date:2011/09/28 報告人:向峻霈 出處: Ren-Chiun Wang  Wen-Shenq Juang 
Improvement of recently proposed Remote User Authentication Schemes
Authors: Yuh-Min TSENG, Tsu-Yang WU, Jui-DiWU
Recent Developments on Multimedia and Secure Networking Technologies
II. REVIEW OF THE DAS ET AL. SCHEME
Improvement of Chien et al
Privacy Protection for E-Health Systems by
Presentation transcript:

A simple remote user authentication scheme 1. M. S. Hwang, C. C. Lee and Y. L. Tang, “A simple remote user authentication scheme,” Mathematical and Computer Modelling, Vol. 36, No. 1-2, pp , July E. J. Yoon, E. K. Ryu and K. Y. Yoo, “An improvement of Hwang–Lee–Tang's simple remote user authentication scheme,” Computers & Security, In Press. Presented by Hsing-Bai Chen ( 陳星百 ) 17 Sep. 2004

Outline Introduction Design goals Hwang-Lee-Tang’s scheme (HLT’s scheme) Discussions on HLT’s scheme Improved scheme (YRY’s scheme) Security analysis Conclusion Comments

Introduction UserPublic channel ID, PW Remote server

Brief summary Remote user authentication Lamport, 1981 Hwang-Li, 2000 Modification attacks EfficiencySecurity Using smart cards to eliminate the risk and cost of maintaining verification tables.

Design goals Require no password or verification tables in the server side Solve replay attacks Choose and change users password freely Reveal no passwords to the server

HLT's scheme (1/3) Registration phase: U i Server Choose ID i, PW i ID i, h(PW i ) Compute A i = h(ID i  x)  h(PW i ) Smart card (stored h( ), A i ) Compute h(PW i )

HLT's scheme (2/3) Login phase: U i Server Compute B i = A i  h(PW i ) = h(ID i  x) ID i, C i, T Verify C i = h(h(ID i  x)  T) Compute C i = h(B i  T) Authentication phase: Check (T  T)   T Check ID i

HLT’s scheme (3/3) Password change phase: U i Server Compute B i = A i  h(PW i ) = h(ID i  x) Compute A i = B i  h(PW i new ) Select PW i new and compute h(PW i new ) Store A i

Discussions on HLT’s scheme Suppose the intruder has stolen x expensive to re-compute the secret hash value Suppose the smart card is stolen Altered password B i = A i  h(PW) = h(ID i  x)  h(PW i )  h(PW) A i = B i  h(PW  ) Denial of service attack Speed of detecting wrong password is slow No mutual authentication

YRY’s scheme (1/3) Registration phase: U i Server Choose ID i, PW i ID i, PW i Compute A i = h(ID i, T TSA, x)  PW i Smart card (stored h( ), ID i, V i, A i ) Compute V i = h(ID i, T TSA, x)

YRY’s scheme (2/3) Login phase: U i Server Compute B i = A i  PW i = h(ID i, T TSA, x) Verify B i = V i Compute C 1 = h(B i, T) ID i, C 1, T Authentication phase: Compute B i  = h(ID i, T TSA, x) Check (T  T)   T Check ID i Verify C 1 = h(B i , T) Compute C 2 = h (B i , C 1, T  ) C 2, T  Check (T  T  )   T Verify C 2 = h(B i, C 1, T  )

YRY’s scheme (3/3) Password change phase: U i Server Compute B i = A i  PW i = h(ID i, T TSA, x) Compute A i = B i  PW i new Select PW i new Store A i Verify B i = V i

Security analysis Protect from Forgery attacks Replay attacks Impersonation attacks Deniable of service attacks Spoofing attacks No body can compute B i = h(ID i, T TSA, x) even if x is revealed

Conclusion Achieve No verification table Freedom in changing password Elimination of denial of service attacks Secure hash value Mutual authentication Fast detection of wrong input password Less computational cost