원문정보
초록
영어
A dynamic ID-based user authentication scheme is designed to protect leakage of a user’s partial information from intruders while enabling authenticated users to be granted access to the network service. In 2012, Wen and Li proposed a dynamic ID-based remote user authentication scheme with key agreement and claimed that their scheme resisted impersonation attacks and avoided leakage of partial information. However, Kim, et al., described that Wen and Li’s scheme could leak some key information to an adversary and is vulnerable to a man-in-the-middle attack launched by any adversary. In this paper, we show how to solve the vulnerabilities in Wen and Li’s scheme.
목차
1. Introduction
2. Wen and Li’s scheme
2.1. Registration phase
2.2. Login phase
2.3. Authentication and key exchange phase
2.4. Mutual authentication and key confirmation phase
3. Security weaknesses of Wen and Li’s scheme
3.1. Man-in-the-middle attack
4. Improved Scheme
4.1. Registration phase
4.2. Login phase
4.3. Authentication and key exchange phase
4.4. Mutual authentication and key confirmation phase
5. Security Analysis
5.1. Man-in-the-middle attack
5.2. Stolen smart card attack
6. Conclusion
Acknowledgements
References