Security analysis of smart card based password authentication schemes

Hyun Seok Kim, Suk Seo, Jin Young Choi

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)

    Abstract

    In the last few years, researchers have extensively studied the key exchange protocol. In 2007, Kwon et al. proposed a simple three-step key exchange protocol using smart card. In 2008, Chen and Lee proposed a secure and efficient user authentication scheme using smart card that is modified to enhance the security of the series of the Peyravian-Zunic scheme. The current paper demonstrates the vulnerability of Kwon et al.'s protocol regarding off-line password guessing attack and forgery attack. Also, we show that Chen and Lee's scheme is still vulnerable to the off-line password guessing attack and has the non-reparability. In this paper, in addition, after analyzing the two protocols, we propose each of countermeasure against our attacks.

    Original languageEnglish
    Title of host publicationProceedings - 3rd International Conference on Information Sciences and Interaction Sciences, ICIS 2010
    Pages352-356
    Number of pages5
    DOIs
    Publication statusPublished - 2010
    Event3rd International Conference on Information Sciences and Interaction Sciences, ICIS 2010 - Chengdu, China
    Duration: 2010 Jun 232010 Jun 25

    Publication series

    NameProceedings - 3rd International Conference on Information Sciences and Interaction Sciences, ICIS 2010

    Other

    Other3rd International Conference on Information Sciences and Interaction Sciences, ICIS 2010
    Country/TerritoryChina
    CityChengdu
    Period10/6/2310/6/25

    Keywords

    • Forgery attack
    • Key exchange protocol
    • Non-reparability
    • Off-line password guessing attack
    • Password-based authentication

    ASJC Scopus subject areas

    • Human-Computer Interaction
    • Information Systems

    Fingerprint

    Dive into the research topics of 'Security analysis of smart card based password authentication schemes'. Together they form a unique fingerprint.

    Cite this