Skip to main content

Cryptanalysis of Lightweight User Authentication Scheme Using Smartcard

  • Conference paper
  • First Online:
Advances in Human Factors in Cybersecurity (AHFE 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 593))

Included in the following conference series:

  • 2031 Accesses

Abstract

The mobile device market has grown rapidly, and as the internet becomes available wireless, it offers a variety of services to people such as browsing, file sharing, shopping anytime and anywhere. Contemporary, a smartcard comes to one of beneficial thing because of its convenience and lightweight. As smartcards become commercially available, on one side, smartcard based authentication scheme also actively researched. In 2016, Ahmed et al. proposed lightweight communication overhead authentication scheme with smartcard. Ahmed et al. argued that scheme they proposed was lightweight compared to the previously well-known other schemes, safe from multiple attacks, and satisfied multiple security features. However, we found that Ahmed et al.’s scheme also showed weaknesses and scheme’s progress was incomplete. In this paper, we briefly introduce Ahmed et al.’s scheme and demonstrate that their scheme is still unstable to apply to user authentication environment using smartcard.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)

    Google Scholar 

  2. Hwang, M.-S., Li, L.-H.: A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(1), 28–30 (2000)

    Article  Google Scholar 

  3. Liao, Y.-P., Wang, S.-S.: A secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces 31(1), 24–29 (2009)

    Article  Google Scholar 

  4. Kang, D., et al.: Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain. Secur. Commun. Netw. (2016)

    Google Scholar 

  5. Li, C.-T., Hwang, M.-S.: An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1), 1–5 (2010)

    Article  Google Scholar 

  6. Li, X., et al.: Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 34(1), 73–79 (2011)

    Article  Google Scholar 

  7. Jung, J., et al.: An improved and secure anonymous biometric-based user authentication with key agreement scheme for the integrated EPR information system. PloS One 12(1), e0169414 (2017)

    Article  Google Scholar 

  8. Lee, H., et al.: Forward anonymity-preserving secure remote authentication scheme. KSII Trans. Internet Inf. Syst. 10(3) (2016)

    Google Scholar 

  9. Chien, H.-Y., Chen, C.-H.: A remote authentication scheme preserving user anonymity. In: 19th International Conference on Advanced Information Networking and Applications, AINA 2005, vol. 2. IEEE (2005)

    Google Scholar 

  10. Yang, G., et al.: Two-factor mutual authentication based on smart cards and passwords. J. Comput. Syst. Sci. 74(7), 1160–1172 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  11. Kim, J., et al.: Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 14(4), 6443–6462 (2014)

    Article  Google Scholar 

  12. Al Sahlani, A.Y.F., Lu, S.: Lightweight communication overhead authentication scheme using smart card. Indonesian J. Electr. Eng. Comput. Sci. 1(3), 597–606 (2016)

    Google Scholar 

  13. Kocher, P., et al.: Introduction to differential power analysis. J. Cryptographic Eng. 1(1), 5–27 (2011)

    Article  Google Scholar 

  14. Amin, R., Biswas, G.P.: A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw. 36, 58–80 (2016)

    Article  Google Scholar 

  15. Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Heidelberg (2004)

    Google Scholar 

  16. Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In: IMA International Conference on Cryptography and Coding. Springer, Heidelberg (1997)

    Google Scholar 

Download references

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2010-0020210).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dongho Won .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Kang, D., Jung, J., Yang, H., Choi, Y., Won, D. (2018). Cryptanalysis of Lightweight User Authentication Scheme Using Smartcard. In: Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. AHFE 2017. Advances in Intelligent Systems and Computing, vol 593. Springer, Cham. https://doi.org/10.1007/978-3-319-60585-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60585-2_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60584-5

  • Online ISBN: 978-3-319-60585-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics