원문정보
초록
영어
Secure and efficient authentication scheme has been a very important issue with the development of networking technologies. Li and Hwang proposed an efficient biometrics-based remote user authentication scheme using smart cards. However, recently, Li et al. pointed out that their scheme is vulnerable to the man-in-the-middle attack, and does not provide proper authentications, and Li et al. proposed an improved biometrics-based authentication scheme. These schemes are vulnerable to various attacks even if the schemes are based on tamper-resistant technologies. Tamper-resistant technologies have been developed with the various applications of smart cards. Therefore, we will assume that the user could use the tamper-resistant smart card in this paper. First of all, this paper shows that Li et al.’s scheme is vulnerable to the replay attack and has a weakness to the password changing scheme even if it is assumed that the scheme could use the tamper-resistant smart cards. Furthermore, we propose an enhanced authentication scheme to solve the security flaws in the two schemes.
목차
1. Introduction
2. Review of Related Schemes
2.1. Attributes of Smart Cards
2.2. Related Schemes and Cryptanalysis of Them
2.3. Li et al.’s scheme
2.4. Cryptanalysis of Li et al.’s Scheme
3. Proposed Authentication Scheme
3.1. Registration Phase
3.2. Login and Authentication Phase
3.3. Password Change Phase
4. Security and Performance Analysis
4.1 Security Analysis
4.2. Performance Analysis
5. Conclusion
References
