Cryptanalysis of Dynamic ID-Based User Authentication Scheme Using Smartcards Without Verifier Tables

  • Conference paper
  • First Online:
Advances in Computer Science and Ubiquitous Computing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 373))

  • 1834 Accesses

Abstract

Password-based remote user authentication technique is the most commonly used for secure communication over insecure network environments. Due to its simplicity and efficiency, it is widely used in many fields such as e-commerce, distributed system, remote host login system, etc. In recent years, several dynamic ID-based user authentication schemes using password and smart card have been proposed to provide mutual authentication between the user and server. Recently, Lee proposed an efficient dynamic ID-based user authentication scheme without verifier tables. Lee claimed that his scheme can resist off-line password guessing attack, user impersonation attack and provide user anonymity. In this paper, we demonstrate that Lee’s enhanced scheme is not secure against off-line password guessing attack and user impersonation attack in violation of its security claim as well as it fails to preserve user anonymity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Lamport, L.: Password authentication with insecure communication. Communications of ACM 24, 770–772 (1981)

    Article  Google Scholar 

  2. Das, M.L., Saxena, A., Gulati, V.P.: A Dynamic ID-based Remote User Authentication Scheme. IEEE Transactions on Consumer Electronics 50, 629–631 (2004)

    Article  Google Scholar 

  3. Liao, I.E., Lee, C.C., Hwang, M.S.: Security enhancement for a dynamic id-based remote user authentication scheme. In: Proceedings of the International Conference on the Next Generation Web Services Practices, pp. 22–26 (2005)

    Google Scholar 

  4. Misbahuddin, M., Bindu, C.S.: Cryptanalysis of Liao- Lee-Hwang’s Dynamic ID Scheme. International Journal of Network Security 6, 211–213 (2008)

    Google Scholar 

  5. Wang, Y.Y., Liu, J.Y., **a, F.X., Dan, J.: A More Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme. Computer Communications 32, 583–585 (2009)

    Article  Google Scholar 

  6. Ahmed, M.A., Lakshmi, D.R., Sattar, S.A.: Cryptanalysis of A More Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme. International Journal of Network Security & Its Applications 1, 32–37 (2009)

    Google Scholar 

  7. Lee, H., Choi, D., Lee, Y., Won, D., Kim, S.: Security Weaknesses of Dynamic ID-based Remote User Authentication Protocol. Proceedings of the World Academy of Science Engineering and Technology 59, 190–193 (2009)

    Google Scholar 

  8. Lee, Y.C.: A New Dynamic ID-based User Authentication Scheme to Resist Smart-Card-Theft Attack. Applied Mathematics and Information Sciences 6, 355–361 (2012)

    MathSciNet  Google Scholar 

  9. Lee, T.F.: An Efficient Dynamic ID-based User Authentication Scheme using Smartcard without Verifier Tables. Applied Mathematics and Information Sciences 9, 485–490 (2014)

    Article  Google Scholar 

  10. Kocher, P., Jaffe, J., Jun, B.: Proceedings of Advances in Cryptology (CRYPTO 1999), vol. 1666, pp. 388–397 (1999)

    Google Scholar 

  11. Nam, J., Choo, K.K.R., Kim, J., Kang, H.K., Kim, J., Paik, J., Won, D.: Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model. Sensors 2014 14(4), 6443–6462 (2014)

    Google Scholar 

  12. Jung, J., Jeon, W., Won, D.: An enhanced remote user authentication scheme using smart card. In: ICUIMC 2014 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dongho Won .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media Singapore

About this paper

Cite this paper

Jung, J., Choi, Y., Lee, D., Kim, J., Mun, J., Won, D. (2015). Cryptanalysis of Dynamic ID-Based User Authentication Scheme Using Smartcards Without Verifier Tables. In: Park, DS., Chao, HC., Jeong, YS., Park, J. (eds) Advances in Computer Science and Ubiquitous Computing. Lecture Notes in Electrical Engineering, vol 373. Springer, Singapore. https://doi.org/10.1007/978-981-10-0281-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0281-6_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0280-9

  • Online ISBN: 978-981-10-0281-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation