earticle

논문검색

Cryptanalysis of a Biometric-based Multi-Server Authentication Scheme

초록

영어

Authentication and key agreement protocol becomes an important security issue for multi-server architecture. Combining biometrics with password enhances the level of security. Recently, Baruah et al. analyzed that Mishra et al.’s protocol has several drawbacks and proposed an improved biometric based multi-server authentication scheme. They claimed that their scheme satisfies all the required security attributes for a secure authentication. In this paper, we indicate that their scheme is not secure against key reveal attack, replay attack, and smart card forgery attack. Any registered user can retrieve the session key or launch the replay attack by eavesdropping on the communication channel. In addition, registered user can forge smart card when colluding with registered server.

목차

Abstract
 1. Introduction
 2. Review of Baruah et al.’s Scheme
  2.1. Server Registration Phase
  2.2. User Registration Phase
  2.3. Login Phase
  2.4. Authentication Phase
  2.5. Password Change Phase
 3. Security Analysis of Baruah et al.’s scheme
  3.1. Key Reveal Attack
  3.2. Replay Attack
  3.3. Smart card Forgery Attack
 4. Conclusions
 References

저자정보

  • Tao Wan School of Computer Science and technology, Xidian University, Xi’an 710071, China
  • Nan Jiang School of Information Engineer, East China Jiaotong University, Nanchang 330013, China
  • Jianfeng Ma School of Computer Science and technology, Xidian University, Xi’an 710071, China
  • Lin Yang The Research Institute, China Electronic Equipment and Systems Engineering Corporation, Beijing 100039, China

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.