Skip to main content
Erschienen in: Wireless Personal Communications 4/2019

13.09.2019

On the Secure Design of Hash-Based Authenticator in the Smartcard Authentication System

verfasst von: Jin Wook Byun

Erschienen in: Wireless Personal Communications | Ausgabe 4/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Most practical authentication systems employ an hash-based authenticator for mutual authentication. Usually a hash-based authenticator consists of a cryptographic-secure hash function that takes input of a shared key and common exchanged values between participants. Recently, in IEEE transaction on industrial informatics, Tsai et al. have presented a novel anonymous hash-based authentication system with provable security. Very recently, however, it has been demonstrated that Tsai et al.’s protocol has not been secure in view of provable security due to an inappropriate design of input for hash-based authenticator. Its countermeasure has been briefly sketched but it hasn’t presented a definite protocol with provable security. In this paper, first of all, we redesign Tsai et al.’s authentication protocol to be secure against session key security and present a new anonymous and authentication protocol with provable security guaranteeing both for session key security and anonymity. It is more simple and efficient than the previous results.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
In [13], the notion of freshness is defined to satisfy that “Send(\(U^t, m\)), Send(\(S^j, m\)) are asked after the Corrupt query is asked”, but it seems to be ill-defined by the authors due to a lack of understanding regarding BPR security model. At any rate, whether it is never asked or asked, the TLW protocol is insecure, that is shown in Chapter III.
 
Literatur
1.
Zurück zum Zitat Bellare, M., Pointcheval, D., & Rogaway, P. (2000). Authentincated key exchange secure against dictionaray attacks. In Proceedings of Eurocrypt, LNCS (pp. 139–155). Bellare, M., Pointcheval, D., & Rogaway, P. (2000). Authentincated key exchange secure against dictionaray attacks. In Proceedings of Eurocrypt, LNCS (pp. 139–155).
2.
Zurück zum Zitat Byun, J. W. (2016). A brief consideration on the security of hash-based authenticator. Journal of the Korea Institute of Information Security and Cryptology, 26(3), 609–612.CrossRef Byun, J. W. (2016). A brief consideration on the security of hash-based authenticator. Journal of the Korea Institute of Information Security and Cryptology, 26(3), 609–612.CrossRef
3.
Zurück zum Zitat Byun, J. W. (2015). Privacy preserving smartcard-based authentication system with provable security. Security and Communication Networks, 8(17), 3028–3044.CrossRef Byun, J. W. (2015). Privacy preserving smartcard-based authentication system with provable security. Security and Communication Networks, 8(17), 3028–3044.CrossRef
4.
Zurück zum Zitat Horng, W. -B., Lee, C. -P., & Peng, J. -W. (2010). Security weakness of song’s advanced smart card based password authentication protocol. In Proceedings of the 2010 IEEE International Conference on Progress in Informatics and Computing (pp. 477–480). Horng, W. -B., Lee, C. -P., & Peng, J. -W. (2010). Security weakness of song’s advanced smart card based password authentication protocol. In Proceedings of the 2010 IEEE International Conference on Progress in Informatics and Computing (pp. 477–480).
5.
Zurück zum Zitat Juang, W. S., Chen, S. T., & Liau, H. T. (2008). Robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics, 55(6), 2552–2556.CrossRef Juang, W. S., Chen, S. T., & Liau, H. T. (2008). Robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics, 55(6), 2552–2556.CrossRef
6.
Zurück zum Zitat Lee, N. Y., & Chiu, Y. C. (2005). Improve remote authentication of Chien et al’.s remote user authentication scheem using smart cards. Computer Standards and Interfaces, 27(2), 177–180.CrossRef Lee, N. Y., & Chiu, Y. C. (2005). Improve remote authentication of Chien et al’.s remote user authentication scheem using smart cards. Computer Standards and Interfaces, 27(2), 177–180.CrossRef
7.
Zurück zum Zitat Lee, S. W., Kim, H. S., & Yoo, K. Y. (2005). Improvement of Chien et al’.s remote user authentication scheme using smart cards. Computer Standards and Interfaces, 27(2), 181–183.CrossRef Lee, S. W., Kim, H. S., & Yoo, K. Y. (2005). Improvement of Chien et al’.s remote user authentication scheme using smart cards. Computer Standards and Interfaces, 27(2), 181–183.CrossRef
8.
Zurück zum Zitat Li, X., Qiu, W., Zheng, D., Chen, K., & Li, J. (2010). Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics, 57(2), 793–800.CrossRef Li, X., Qiu, W., Zheng, D., Chen, K., & Li, J. (2010). Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics, 57(2), 793–800.CrossRef
9.
Zurück zum Zitat Shoup, V. (2004). Sequences of games: a tool for taming complexity in security proofs. In IACR eprint 2004/332. Shoup, V. (2004). Sequences of games: a tool for taming complexity in security proofs. In IACR eprint 2004/332.
10.
Zurück zum Zitat Song, R. (2010). Advanced smart card based password authentication protocol. Computer Standards and interfaces, 32(5–6), 321–325.CrossRef Song, R. (2010). Advanced smart card based password authentication protocol. Computer Standards and interfaces, 32(5–6), 321–325.CrossRef
11.
Zurück zum Zitat Sun, D. Z., Huai, J. P., Sun, J. Z., Zhang, J. W., & Feng, Z. Y. (2009). Improvements of Juang et al’.s password-authenticated key agreement scheme using smart cards. IEEE Transaction Industrial Electronics, 56(6), 2284–2291.CrossRef Sun, D. Z., Huai, J. P., Sun, J. Z., Zhang, J. W., & Feng, Z. Y. (2009). Improvements of Juang et al’.s password-authenticated key agreement scheme using smart cards. IEEE Transaction Industrial Electronics, 56(6), 2284–2291.CrossRef
13.
Zurück zum Zitat Tsai, J.-L., Lo, N.-W., & Txong-Chen, W. (2012). Novel anonymous authentication scheme using smart cards. IEEE Transaction on Industrial Informatics, 9(4), 2004–2013.CrossRef Tsai, J.-L., Lo, N.-W., & Txong-Chen, W. (2012). Novel anonymous authentication scheme using smart cards. IEEE Transaction on Industrial Informatics, 9(4), 2004–2013.CrossRef
14.
Zurück zum Zitat Xu, J., Zhu, W.-T., & Feng, D.-G. (2009). An improved smart card based password authentication scheme with provable security. Computer Standards and Interfaces, 31(4), 723–728.CrossRef Xu, J., Zhu, W.-T., & Feng, D.-G. (2009). An improved smart card based password authentication scheme with provable security. Computer Standards and Interfaces, 31(4), 723–728.CrossRef
Metadaten
Titel
On the Secure Design of Hash-Based Authenticator in the Smartcard Authentication System
verfasst von
Jin Wook Byun
Publikationsdatum
13.09.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06684-5

Weitere Artikel der Ausgabe 4/2019

Wireless Personal Communications 4/2019 Zur Ausgabe

Neuer Inhalt