| Literature DB >> 24892078 |
Ashok Kumar Das1, Vanga Odelu2, Adrijit Goswami2.
Abstract
In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.Entities:
Mesh:
Year: 2014 PMID: 24892078 PMCID: PMC4032675 DOI: 10.1155/2014/719470
Source DB: PubMed Journal: ScientificWorldJournal ISSN: 1537-744X
Summary of the registration phase of our scheme.
| User ( | Remote server ( |
|---|---|
| Selects | |
| Generates secret number | |
| Computes | |
|
| |
| (via a secure channel) | Generates secret number |
| Computes | |
|
| |
|
| |
|
| |
| (via a secure channel) | |
| Stores |
Summary of the login phase of our scheme.
| User ( | Remote server ( |
|---|---|
| Inputs | |
| Computes | |
| Checks if | |
| computes | |
|
| |
| and | |
|
| |
| (via a public channel) |
Summary of the authentication phase of our scheme.
| User ( | Remote server ( |
|---|---|
| Checks the validity of | |
| If it holds, computes | |
|
| |
|
| |
| and | |
| Checks if | |
| computes | |
|
| |
| and | |
| || | |
|
| |
| Checks the validity of | (via a public channel) |
| If it holds, computes | |
|
| |
|
| |
|
| |
| and | |
| || | |
| holds, updates | |
|
| |
|
| |
| (via a public channel) | Computes |
| || | |
| Checks if | |
|
| |
| Computes | Computes |
Algorithm 1EX P1 .
Algorithm 2EX P2 .
Algorithm 3Role specification in HLPSL for the user U of our scheme.
Algorithm 4Role specification in HLPSL for the server S of our scheme.
Algorithm 5Role specification in HLPSL for the session of our scheme.
Algorithm 6Role specification in HLPSL for the goal and environment of our scheme.
The result of the analysis using OFMC of our scheme.
| % OFMC | |
| % Version of 2006/02/13 | |
| SUMMARY | |
| SAFE | |
| DETAILS | |
| BOUNDED_NUMBER_OF_SESSIONS | |
| PROTOCOL | |
| /home/avispa/web−interface−computation/ | |
| ./tempdir/workfiletnHXFr.if | |
| GOAL | |
| as_specified | |
| BACKEND | |
| OFMC | |
| COMMENTS | |
| STATISTICS | |
| parseTime: 0.00 s | |
| searchTime: 0.30 s | |
| visitedNodes: 13 nodes | |
| depth: 4 plies |
Comparison of communication overhead between our scheme and other related schemes during the login and authentication phases.
| Scheme | Total number of messages required | Total number of bits required |
|---|---|---|
|
Lee and Liu [ | 3 | 1504 |
| Das and Bruhadeshwar [ | 3 | 1664 |
| Sonwanshi et al. [ | 2 | 704 |
| Jiang et al. [ | 3 | 1944 |
| Ours | 3 | 1184 |
Comparison of computational overhead between our scheme and other schemes during all phases.
| Phase | [ | [ | [ | [ | Ours |
|---|---|---|---|---|---|
| Registration | 2 | 4 | 2 | 7 | 4 |
| Login + authentication | 2 | 2 | 13 | 10 | 14 |
| Password change | 2 | 5 | 4 | 2 | 6 |
|
| |||||
| Total | 2 | 2 | 19 | 19 | 24 |
Note: t : the time to compute a one-way hash function; t me: the time to compute a modular exponentiation; t ecm: the time to compute a point multiplication on the elliptic curve group; t eca: the time to compute a point addition on the elliptic curve group.
Functionality comparison between our scheme and other schemes.
| Functionality | [ | [ | [ | [ | Ours |
|---|---|---|---|---|---|
|
| No | Yes | No | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes |
|
| No | Yes | Yes | Yes | Yes |
|
| Yes | Yes | Yes | Yes | Yes |
|
| Yes | Yes | No | Yes | Yes |
|
| Yes | Yes | No | Yes | Yes |
|
| Yes | Yes | No | No | Yes |
|
| Yes | Yes | No | Yes | Yes |
|
| Yes | Yes | No | Yes | Yes |
|
| Yes | Yes | No | Yes | Yes |
|
| No | Yes | No | No | Yes |
|
| No | Yes | No | No | Yes |
|
| No | Yes | No | Yes | Yes |
|
| No | Yes | Yes | Yes | Yes |
|
| No | Yes | Yes | Yes | Yes |
|
| No | No | No | No | No |
Notes: F 1: whether it protects against strong replay attacks or not; F 2: whether it protects against man-in-the-middle attacks or not; F 3: whether it protects against privileged insider attacks or not; F 4: whether it protects against impersonation attacks or not; F 5: whether it protects against stolen smart card attacks or not; F 6: whether it protects against password guessing attacks or not; F 7: whether it protects against denial-of-service attacks or not; F 8: whether it provides mutual authentication or not; F 9: whether it provides user anonymity property or not; F 10: whether it establishes a secret session key between U and S after successful authentication or not; F 11: whether it provides formal security proof or not; F 12: whether it provides formal security verification or not; F 13: whether it provides session key security or not; F 14: whether it supports local password verification or not; F 15: whether it provides password changing freely and correctly or not; F 16: whether it requires any password verification table or not.