Efficient remote user authentication scheme using smart cards

In 2009, Kim-Chung proposed a secure remote user authentication scheme. In this paper, we show that Kim-Chung|s scheme does not establish a session key. Moreover, the scheme requires time-synchronisation. In order to remedy these drawbacks, this paper proposes an improvement scheme which fulfils all the security requirements for a remote user authentication scheme. Security analysis proved that the improved scheme resists the typical attacks. Furthermore, the analysis of computational cost and storage capacity demonstrated that the scheme is feasible for a practical implementation.

[1]  Robert H. Sloan,et al.  Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.

[2]  Bin Wang,et al.  A Forward-Secure User Authentication Scheme with Smart Cards , 2006, Int. J. Netw. Secur..

[3]  Wei-Chi Ku,et al.  Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards , 2004, IEEE Transactions on Consumer Electronics.

[4]  Yi-xian Yang,et al.  Weaknesses and improvements of a remote user authentication scheme using smart cards , 2007 .

[5]  Kee-Young Yoo,et al.  Improved efficient remote user authentication scheme using smart cards , 2004, IEEE Transactions on Consumer Electronics.

[6]  Hung-Yu Chien,et al.  An Efficient and Practical Solution to Remote Authentication: Smart Card , 2002, Comput. Secur..

[7]  Chin-Chen Chang,et al.  Remote password authentication with smart cards , 1991 .

[8]  Tzonelih Hwang,et al.  Non-interactive password authentications without password tables , 1990, IEEE TENCON'90: 1990 IEEE Region 10 Conference on Computer and Communication Systems. Conference Proceedings.

[9]  Cheng-Chi Lee,et al.  A remote user authentication scheme using hash functions , 2002, OPSR.

[10]  Yan-yan Wang,et al.  A more efficient and secure dynamic ID-based remote user authentication scheme , 2009, Comput. Commun..

[11]  Min Gyo Chung,et al.  More secure remote user authentication scheme , 2009, Comput. Commun..

[12]  Ashutosh Saxena,et al.  A dynamic ID-based remote user authentication scheme , 2004, IEEE Transactions on Consumer Electronics.

[13]  Mohammed Aijaz Ahmed,et al.  Cryptanalysis of a more efficient and secure dynamic id-based remote user authentication scheme , 2010, ArXiv.

[14]  Chien-Lung Hsu Security of two remote user authentication schemes using smart cards , 2003, IEEE Trans. Consumer Electron..

[15]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .