SciELO - Scientific Electronic Library Online

 
vol.12 issue6Simulation and Implementation of an Integrated TDOA/AOA Monitoring System for Preventing Broadcast InterferenceA Low-Complexity Integer Frequency Offset Estimation Scheme Using Combined Training Symbols for OFDM Systems author indexsubject indexsearch form
Home Pagealphabetic serial listing  

Services on Demand

Journal

Article

Indicators

Related links

  • Have no similar articlesSimilars in SciELO

Share


Journal of applied research and technology

On-line version ISSN 2448-6736Print version ISSN 1665-6423

Abstract

LEE, Yung-Cheng; HSIEH, Yi-Chih; LEE, Pei-Ju  and  YOU, Peng-Sheng. Improvement of the EIGamal Based Remote Authentication Scheme Using Smart Cards. J. appl. res. technol [online]. 2014, vol.12, n.6, pp.1063-1072. ISSN 2448-6736.

Nowadays, we can easily obtain variety of services through networks. But due to the open environment, networks are vulnerable to many security threats. The remote user authentication scheme is one of the most widely used mechanisms for servers to authorize users to access the services. In 2009, Ramasamy and Muniyandi proposed a discrete logarithm based remote authentication scheme with smart cards. Their scheme provides mutual authentication and withstands the denial of service attack, forgery attack and parallel session attack. In this article, we show that their scheme is not a practical solution for remote access. It lacks key agreement mechanism and users cannot choose or update passwords freely. Moreover, their scheme cannot resist the stolen-verifier attack, off-line guessing attack, impersonation attack and smart-card-loss-attack. We propose an improved scheme to remedy the drawbacks. The improved scheme has the merits of providing mutual authentication and key agreement, while forward and backward secrecy are ensured as well. The users can choose and update their passwords freely. Furthermore, the scheme can also withstand many attacks such as the smart-card-loss-attack, the replay attack, the off-line guessing attack, the insider attack, the impersonation attack and the parallel session attack.

Keywords : Remote authentication; smart cards; discrete logarithm problem.

        · text in English     · English ( pdf )

 

Creative Commons License All the contents of this journal, except where otherwise noted, is licensed under a Creative Commons Attribution License