Download presentation
Presentation is loading. Please wait.
Published byMartin Malone Modified over 8 years ago
1
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks Hyeran Mun, Kyusuk Han, Yan Sun Lee, Chan Yeob Yeun, Hyo Hyun Choi Mathematical and Computer Modelling Volume 55, Issues 1–2, January 2012, Pages 214–222 Citation: 3 Presenter: 林致良 Date: 2012/11/26 1
2
Outline Introduction Wu–Lee–Tsaur’s scheme Weaknesses of Wu–Lee–Tsaur’s scheme New enhancement for anonymous authentication scheme Analysis Conclusion 2
3
Outline Introduction Wu–Lee–Tsaur’s scheme Weaknesses of Wu–Lee–Tsaur’s scheme New enhancement for anonymous authentication scheme Analysis Conclusion 3
4
Introduction The GLOMONET provides global roaming service that permits mobile users to use the services provided by the home agent in a foreign agent. Many security problems such as user’s privacy are brought into attention GLOMONET: Global mobility network 4
5
Introduction You will see : Security weaknesses in Wu–Lee–Tsaur’s scheme such as disclosing of the legitimate user and failing to achieve perfect forward secrecy. A new novel scheme that also achieves mutual authentication and resistance to a man-in-the-middle attack. 5
6
Outline Introduction Wu–Lee–Tsaur’s scheme Weaknesses of Wu–Lee–Tsaur’s scheme New enhancement for anonymous authentication scheme Analysis Conclusion 6
7
Wu–Lee–Tsaur’s scheme Wu–Lee–Tsaur’s authentication scheme consists of three phases: 1. Initial phase 2. first phase 3. second phase 7
8
Wu–Lee–Tsaur’s scheme Initial phase PW MU = h(N ǁ ID MU ) r MU = h(N ǁ ID HA ) ⊕ h(N ǁ ID MU ) ⊕ ID HA ⊕ ID MU where N is a secret random number that is kept by HA 8
9
Wu–Lee–Tsaur’s scheme First phase 9 1. n MU, (h(ID MU ) ǁ x 0 ǁ x) L, ID HA,T MU 2. b, n MU, (h(ID MU ) ǁ x 0 ǁ x) L, T MU, Cert FA,T FA E S FA (h(b, nMU, (h(ID MU ) ǁ x 0 ǁ x) L, T MU, Cert FA )) 3. c, Cert HA, T HA, E P FA (h(h(N ǁ ID MU ) ǁ x 0 ǁ x) E S HA (h(b, c, E P FA (h(h(N ǁ ID MU )) ǁx 0 ǁ x), Cert HA )) 4. (TCert MU ǁ h(x 0 ǁ x)) k n MU = r MU ⊕ PW MU L = h(T MU ⊕ PW MU ) HA computes ID MU = h(N ǁ ID HA ) ⊕ n MU ⊕ ID HA h’ = h(ID MU ) compare with (h(ID MU ) ǁ x 0 ǁ x) L MU can be authenticated session key k = h(h(h(N ǁ ID MU )) ǁx 0 ǁx) MU check h(x 0 ǁ x) is equal to original FA can be authenticated
10
Wu–Lee–Tsaur’s scheme Second phase (update session key) When MU accesses FA at ith session, MU requests FA to update the session key. Step 1: MU → FA : TCert MU, ( x i ǁ TCert MU ) ki New ith session key k i can be computed by using An unexpired previous secret random number x i−1 Fixed the secret random number x k i = h ( h ( h ( N ǁ ID MU ) ǁ x ǁ x i−1 ), ( i = 1, 2, 3,..., n ). 10
11
Outline Introduction Wu–Lee–Tsaur’s scheme Weaknesses of Wu–Lee–Tsaur’s scheme New enhancement for anonymous authentication scheme Analysis Conclusion 11
12
Weaknesses of Wu–Lee–Tsaur’s scheme 12 Weakness 1 : F ailing to achieve the anonymity Weakness 2: D isclosure password of legitimate user Weakness 3: Perfect forward secrecy Assume : A legitimate user and an attacker A register the same HA. A is able to intercept all messages between FA and MU. Because anyone can overhear all sent and received packets within range of a wireless devices in wireless environment
13
Weaknesses of Wu–Lee–Tsaur’s scheme 13 1.Failing to achieve the anonymity (Zeng et al.) Step 1: A requests registration of HA, and obtains h(.), ID HA, PW A = h(N ǁ ID A ) rA = h(NǁID HA ) ⊕ h(N ǁ ID A ) ⊕ ID HA ⊕ ID A. Step 2: A can compute h(Nǁ ID HA ) as follows: rA ⊕ h(NǁID A ) ⊕ ID HA ⊕ ID A = h(NǁID HA ) ⊕ h(Nǁ ID A ) ⊕ ID HA ⊕ ID A ⊕ h(Nǁ ID A ) ⊕ ID HA ⊕ ID A = h(Nǁ ID HA ). Step 3: A is able to intercept messages nMU, (h(ID MU ) ǁx 0 ǁx) L, ID HA, and T MU. Step 4: A can obtain ID MU by using nMU, ID HA, and h(NǁID HA ) nMU ⊕ h(Nǁ ID HA ) ⊕ ID HA = h(NǁID HA ) ⊕ h(NǁID MU ) ⊕ IDc HA ⊕ ID MU ⊕ h(NǁID MU ) ⊕ h(Nǁ ID HA ) ⊕ ID HA = ID MU. n MU = r MU ⊕ PW MU 利用 XOR 特性 A ⊕ B = C C ⊕ B = A A ⊕ A = 0
14
Weaknesses of Wu–Lee–Tsaur’s scheme 14 2. Disclosure password of legitimate user A can obtain legitimate user’s password PW MU. A can compute PW MU as follows: (1) A can guess composition of r MU by using r A. Composition of r A is h(N ǁ ID HA ) ⊕ h(N ǁ ID MU ) ⊕ ID HA ⊕ ID MU. ID MU is composition of r MU instead of ID A. (2)A can compute legitimate user MU’s password PW MU by using intercepted n MU and guessed r MU. n MU ⊕ r MU = h(N ǁ ID MU ) ⊕ h(N ǁ ID HA ) ⊕ ID HA ⊕ ID MU ⊕ h(N ǁ ID MU ) ⊕ h(N ǁ ID HA ) ⊕ h(N ǁ ID MU ) ⊕ ID HA ⊕ ID MU = h(N ǁ ID MU ) = PW MU r MU
15
Weaknesses of Wu–Lee–Tsaur’s scheme 15 2. Disclosure password of legitimate user
16
Weaknesses of Wu–Lee–Tsaur’s scheme 16 2. Disclosure password of legitimate user Question: How can A guess composition of r MU by using r A. r A = h(N ǁ ID HA ) ⊕ h(N ǁ ID A ) ⊕ ID HA ⊕ ID A r MU = h(N ǁ ID HA ) ⊕ h(N ǁ ID MU ) ⊕ ID HA ⊕ ID MU
17
Weaknesses of Wu–Lee–Tsaur’s scheme 17 3. Perfect forward secrecy
18
Outline Introduction Wu–Lee–Tsaur’s scheme Weaknesses of Wu–Lee–Tsaur’s scheme New enhancement for anonymous authentication scheme Analysis Conclusion 18
19
New enhancement for anonymous authentication scheme The proposed scheme consists of three phases: 1. registration 2. Authentication and establishment of session key 3.update session key 19
20
New enhancement for anonymous authentication scheme First phase: registration 20 1. N MU, ID MU 2. Generate N HA Compute PW MU = h(N MU ǁN HA ) Compute r MU = h(ID MU ǁPW MU ) ⊕ ID HA 3. r MU, ID HA, N HA, PW MU, h(.)
21
New enhancement for anonymous authentication scheme Second phase: Authentication and establishment of session key 21 1. ID HA,N HA, r MU 2.Generate N FA 4. Compare r MU with r’ MU = h(ID MU ǁPW MU ) ⊕ ID HA (Authenticate MU) Compute P HA = h(PW MU ǁN FA ) Compute S HA = h(ID FA ǁN FA ) ⊕ r MU ⊕ P HA 3. ID FA,N FA, r MU 5. S HA, P FA PW MU = h(N MU ǁN HA ) r MU = h(ID MU ǁPW MU ) ⊕ ID HA
22
New enhancement for anonymous authentication scheme 22 6. Verify S HA (i)Compute S’ HA = h(ID FA ǁN FA ) ⊕ r MU ⊕ P HA (ii)Compare S HA with S’ HA Compute S FA = h(S HA ǁ N FA ǁ N HA ) and aP 9. bP, S MF 7. S FA, aP, P FA = (S HA ǁID FA ǁN FA ) 8. Verify S FA (Authenticate HA andFA) 1. S’ HA = h(ID FA ǁN FA ) ⊕ r MU ⊕ h(PW MU ǁ N FA ) 2. Compare S FA with S’ FA = h(S HA ǁ N FA ǁ N HA ) 算 bP, K MF = h(abP), S MF = f K MF (N FA ǁ bP) 10. Computes K MF = h(abP) Verify S MF (Authenticate MU)
23
New enhancement for anonymous authentication scheme Third phase: update session key : K MF i (i = 1.2.3……n) 23 1. Select b i, compute b i P 1. b i P 2.Select a i, compute a i P New session key : h(a i b i P) S MF i = f K MF i (a i b i P ǁ a i−1 b i−1 P) 3. a i P, S MF i 4.Compute K MF i = h(abP) Compare S’ MF i = f K MF i (a i b i P ǁa i−1 b i−1 P) with S MF i
24
Outline Introduction Wu–Lee–Tsaur’s scheme Weaknesses of Wu–Lee–Tsaur’s scheme New enhancement for anonymous authentication scheme Analysis Conclusion 24
25
Security Analysis Achieve anonymity FA receives r MU = h(ID MU ǁ PW MU ) ⊕ ID HA instead of ID MU Thus, FA has no way of guessing ID MU without PW MU = h(N MU ǁ N HA ) and ID HA Provide perfect forward secrecy Prevent disclose of legitimate user’s password To obtain user’s password, an attacker should know two nonces N MU and N HA. r MU = h(ID MU ǁ PW MU ) ⊕ ID HA, P HA = h(PW MU ǁ N FA ) and S FA = h(S HA ǁN FA ǁN HA ) Prevent replay attack The scheme can resist a replay attack by using nonces. Provide mutual authentication between MU and HA Provide mutual authentication between MU and FA 25
26
Security Analysis 26
27
Performance analysis 27 No need for time synchronization: Previous scheme use timestamps for resisting a replay attack. Use Elliptic Curve Diffie–Hellman (ECDH): New scheme uses ECDH instead of using public key cryptosystem with certificates to reduce communication overhead.
28
Outline Introduction Wu–Lee–Tsaur’s scheme Weaknesses of Wu–Lee–Tsaur’s scheme New enhancement for anonymous authentication scheme Analysis Conclusion 28
29
Conclusion There are security weaknesses in Wu–Lee– Tsaur’s scheme such as failing to provide anonymity, disclosing of user’s password and perfect forward secrecy. This paper proposes a novel enhanced scheme that uses Elliptic Curve Diffie–Hellman (ECDH). This scheme is efficient, provides mutual authentication, and resists the man-in-the- middle attack. 29
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.