Improvements in Dynamic ID-based Remote User Authentication Schemes

Author(s):  
FuwYi Yang ◽  
Ying Li ◽  
SuHui Chiu ◽  
ChengSyuan Jiang
2014 ◽  
Vol 543-547 ◽  
pp. 3343-3347
Author(s):  
Xue Lei Li ◽  
Qiao Yan Wen ◽  
Wen Min Li ◽  
Hua Zhang ◽  
Zheng Ping Jin

In this paper, we analyze and point out several weaknesses in the dynamic ID-based remote user authentication schemes using smart card for multi-server environments, and present the countermeasures to enhance the security of the schemes. Taking Li et al.'s scheme for instance, we demonstrate that their scheme does not provide forward secrecy and key privacy for the session keys, and cannot resist offline password guessing attack. Furthermore, the reasons of these security weaknesses are analyzed through extending the attacks to its predecessors. Finally, the improved ideas of local verification and authenticated Diffie-Hellman key agreement are presented to overcome the weaknesses mentioned above.


2013 ◽  
Vol 2013 ◽  
pp. 1-5 ◽  
Author(s):  
Juan Qu ◽  
Li-min Zou

In recent years, several dynamic ID-based remote user authentication schemes have been proposed. In 2012, Wen and Li proposed a dynamic ID-based remote user authentication with key agreement scheme. They claimed that their scheme can resist impersonation attack and insider attack and provide anonymity for the users. However, we will show that Wen and Li's scheme cannot withstand insider attack and forward secrecy, does not provide anonymity for the users, and inefficiency for error password login. In this paper, we propose a novel ECC-based remote user authentication scheme which is immune to various known types of attack and is more secure and practical for mobile clients.


2021 ◽  
Author(s):  
M Khan

The initial version of this paper was published in https://www.sciencedirect.com/science/article/abs/pii/S0920548906000122?via=ihub


Sign in / Sign up

Export Citation Format

Share Document