An efficient and complete remote user authentication scheme using smart cards

In this paper, we propose an efficient and complete remote user authentication scheme using smart cards. Compared with other smart card-based schemes, our scheme achieves more functionality. The important merits include: (1) a dictionary of verification tables is not required to authenticate users; (2) users can choose their password freely; (3) mutual authentication is provided between the user and the remote system; (4) the communication cost and the computational cost are very low; (5) users can update their password after the registration phase; (6) a session key agreed by the user and the remote system is generated in every session; and (7) the nonce-based scheme does not require a timestamp to solve the serious time synchronization problem.

[1]  Hung-Min Sun,et al.  An Efficient Remote User Authentication Scheme Using Smart Cards , 2000 .

[2]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[3]  Stephen M. Matyas,et al.  Cryptographic Authentication of Time-Invariant Quantities , 1981, IEEE Trans. Commun..

[4]  Min-Shiang Hwang,et al.  A new remote user authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..

[5]  葉禾田,et al.  Further Cryptanalysis of password authentication schemes with smart cards , 2003 .

[6]  Shiuh-Pyng Shieh,et al.  Password authentication schemes with smart cards , 1999, Comput. Secur..

[7]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[8]  Wei-Chi Ku,et al.  Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme , 2005, OPSR.

[9]  Wei-Chi Ku,et al.  Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards , 2005, IEICE Trans. Commun..

[10]  Wang Shiuh-Jeng,et al.  Refereed paper: Smart card based secure password authentication scheme , 1996 .

[11]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[12]  Cheng-Chi Lee,et al.  A simple remote user authentication scheme , 2002 .

[13]  Lee-Ming Cheng,et al.  Remarks on Wang-Chang's password authentication scheme , 2001 .

[14]  Hung-Yu Chien,et al.  An Efficient and Practical Solution to Remote Authentication: Smart Card , 2002, Comput. Secur..

[15]  Jin-Fu Chang,et al.  Smart card based secure password authentication scheme , 1996, Computers & security.

[16]  Hung-Min Sun,et al.  An efficient remote use authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..

[17]  Wei-Chi Ku,et al.  Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards , 2005 .