Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card

The weakness of an exquisite authentication scheme based on smart cards and passwords proposed by Liao et al. [C. H. Liao, H. C. Chen, and C. T. Wang, An Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card, Informatica, Vol. 33, No. 2, 2009, 125-132.] is analyzed. Five kinds of weakness are presented in different scenarios. The analyses show that Liao et al.’s scheme is insecure for practical application.

[1]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[2]  Chin-Chen Chang,et al.  Using IC cards to remotely login passwords without verification tables , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..

[3]  Robert H. Sloan,et al.  Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.

[4]  Ching-Te Wang,et al.  An Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card , 2009, Informatica.

[5]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.