An Improvement of Remote Authentication and Key Agreement Schemes

Recently, Shieh et al. have pointed out that Juang's password authenticated key agreement scheme and Chien et al.'s remote authentication scheme are vulnerable to some attacks. Therefore, they presented a modified protocol to avoid those attacks. However, the authors of this article shall show that Shieh et al.'s scheme and Juang's scheme have two weaknesses, respectively. Therefore, we shall improve the weaknesses of their schemes.

[1]  Min-Shiang Hwang,et al.  A new remote user authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..

[2]  M. Hwang,et al.  Simple authenticated key agreement and protected password change protocol , 2005 .

[3]  Cheng-Chi Lee,et al.  A password authentication scheme over insecure networks , 2006, J. Comput. Syst. Sci..

[4]  Chou Chen Yang,et al.  An improvement of the Yang-Shieh password authentication schemes , 2005, Appl. Math. Comput..

[5]  Wen-Shenq Juang,et al.  Efficient password authenticated key agreement using smart cards , 2004, Comput. Secur..

[6]  Hung-Yu Chien,et al.  An Efficient and Practical Solution to Remote Authentication: Smart Card , 2002, Comput. Secur..

[7]  Eun-Jun Yoon,et al.  An improvement of Hwang-Lee-Tang's simple remote user authentication scheme , 2005, Comput. Secur..

[8]  Ami Marowka,et al.  Routing Scalability in Multicore-Based Ad Hoc Networks , 2009, Informatica.

[9]  Ching-Te Wang,et al.  An Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card , 2009, Informatica.

[10]  Zuhua Shao Cryptanalysis of "an identity-based society oriented signature scheme with anonymous signers" , 2003, Inf. Process. Lett..

[11]  Cheng-Chi Lee,et al.  Security enhancement for a dynamic ID-based remote user authentication scheme , 2005, International Conference on Next Generation Web Services Practices (NWeSP'05).

[12]  Jianmin Wang,et al.  Efficient remote mutual authentication and key agreement , 2006, Comput. Secur..

[13]  Alfred Menezes,et al.  Key Agreement Protocols and Their Security Analysis , 1997, IMACC.

[14]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[15]  Cheng-Chi Lee,et al.  Password Authentication Schemes: Current Status and Key Issues , 2006, Int. J. Netw. Secur..

[16]  Alfred Menezes,et al.  An Efficient Protocol for Authenticated Key Agreement , 2003, Des. Codes Cryptogr..