| Literature DB >> 25276847 |
Younsung Choi1, Junghyun Nam2, Donghoon Lee1, Jiye Kim1, Jaewook Jung1, Dongho Won1.
Abstract
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.Entities:
Mesh:
Year: 2014 PMID: 25276847 PMCID: PMC4170879 DOI: 10.1155/2014/281305
Source DB: PubMed Journal: ScientificWorldJournal ISSN: 1537-744X
Figure 1Framework of a multiserver authentication system.
Algorithm 1Login and authentication phase of Chuang and Chen's scheme.
Figure 2Masquerade attack on Chuang and Chen's scheme.
Algorithm 2Smart card attack on Chuang and Chen's scheme.
Figure 3User impersonation attack on Chuang and Chen's scheme.
Figure 4DoS attack on Chuang and Chen's scheme.
Algorithm 3No perfect forward secrecy on Chuang and Chen's scheme.
Algorithm 4Our registration phase.
Algorithm 5Our login and authentication phase.
Algorithm 6Our password change phase.
Comparison of security properties.
| Security properties |
D. Yang and B. Yang scheme [ | Yoon and Yoo scheme [ | Chuang and Chen scheme [ | Our scheme |
|---|---|---|---|---|
| (S1) Anonymity | × | × | ◯ | ◯ |
| (S2) Mutual authentication | ◯ | ◯ | ◯ | ◯ |
| (S3) Session key agreement | ◯ | ◯ | ◯ | ◯ |
| (S4) Perfect forward secrecy | ◯ | ◯ | ◯ | ◯ |
Comparison of attack resistance.
| Attack resistance | D. Yang and B. Yang scheme [ | Yoon and Yoo scheme [ | Chuang and Chen scheme [ | Our scheme |
|---|---|---|---|---|
| (A1) Replay attack | ◯ | × | ◯ | ◯ |
| (A2) Modification attack | ◯ | ◯ | ◯ | ◯ |
| (A3) Stolen-verifier attack | ◯ | ◯ | ◯ | ◯ |
| (A4) Off-line guessing attack | ◯ | × | ◯ | ◯ |
| (A5) Forgery attack | ◯ | × | ◯ | ◯ |
| (A6) Insider attack | × | × | ◯ | ◯ |
| (A7) Masquerade attack | × | × | × | ◯ |
| (A8) Smart card attack | ◯ | × | × | ◯ |
| (A9) User impersonation attack | ◯ | ◯ | × | ◯ |
| (A10) DoS attack | × | × | × | ◯ |
Comparison of efficiency measures.
| Efficiency measures | D. Yang and B. Yang scheme [ | Yoon and Yoo scheme [ | Chuang and Chen scheme [ | Our scheme |
|---|---|---|---|---|
| (E1) Single registration | ◯ | ◯ | ◯ | ◯ |
| (E2) S/S PW modification | ◯ | ◯ | ◯ | ◯ |
| (E3) Fast error detection | ◯ | ◯ | ◯ | ◯ |
|
| ||||
| (E4) Low computational cost | ||||
| Registration user | · |
|
|
|
| Registration server | · | · | · | · |
| Registration RC |
| ( |
|
|
| Login user | 4 | 2 | 4 | 4 |
| Login server | · | · | · | · |
| Authentication user |
| 3 | 5 | 5 |
| Authentication server | 3 | 5 | 8 | 9 |
| Authentication RC | · | 7 | · | · |
| PW change user | 3 | 2 | 3 | 3 |
| PW change RC | · | · | · | · |