Abstract
Remote user authentication is a mechanism in which the remote server verifies the legitimacy of a user over an insecure communication channel. Password based authentication schemes have been widely deployed to verify the legitimacy of remote users as password authentication is one of the simplest and the most convenient authentication mechanism over insecure networks. In remote user authentication scheme, the user is assigned a smart card, which is being personalized by some parameters and provide the legal users to use the resources of the remote system. Until now, there have been ample of remote user authentication schemes published in the literature and each published schemes have its own merits and demerits. Recently, many schemes proposed are based on the one-way hash function. The computational complexity of their schemes is superior to the discrete logarithm-problem-based schemes. In our paper, we have defined all the security requirements and the goals. An ideal password authentication schemes should satisfy and achieve all of these. We have presented the results of our survey through five of the currently available secure one way hash function based remote user authentication schemes. We hope an ideal smart card (not storing (ID i ,PW i ), which meets all the security requirements and achieves all the goals can be developed.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Shimizu, A.: A dynamic password authentication method by one way function. IEICE Transactions 173-D-1(7), 630–636 (1990)
Hsu, C.-L.: Security of chien et al.’s remote user authentication scheme using smart cards. Computer Standards and Interfaces 26, 167–169 (2004)
Hsu, C.L.: A user friendly Remote User Authentication scheme with smart cards against impersonation attacks. Applied Mathematical and Computer 170, 135–143 (2005)
Chan, C.K., Chang, L.M.: Cryptanalysis of a Remote user authentication scheme using smart card using smart cards. IEEE Trans, Consumer Electron 46, 992–993 (2000)
Li, C.T., Hwang, M.S.: An efficient biometric based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 33(1), (5) (January 2010)
Hsu, C.L.: Security of Chien et al’s remote user authentication scheme using smart cards. Computer Standard and Interfaces 26(3), 167–169 (2004)
Sun, D.-Z., et al.: Weakness and improvement on wang-Li-Tie’s user friendly remote authentication scheme. Applied Mathematics and Computation 170, 1185–1193 (2005)
Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Further improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Trans on Consumer Electronics 50(2), 612–614 (2004)
Yoon, E., Yoo, K.: More efficient and secure remote user authentication scheme using smart card. In: Proceeding of 11th International Conference on Parallel and Distributed System, vol. 2, pp. 73–77 (2005)
Hwang, Hwang, L.M.S., Li, L.H.: A new remote user authentication scheme using smart card. IEEE Transactions on Consumer Electronics 46(1), 28–30 (2000)
Sun, H.M.: An efficient remote user authentication scheme using smart card. IEEE Trans on Consumer Electronic 46(4) (2000)
Chien, H.Y., Jan, J.K., Tseng, Y.M.: An efficient and practical solution to remote authentication: smart cards. Computer and Security 21(4), 372–375 (2002)
I-En-Liao, C.-C., Lee, N.-S., Hwang, N.-S.: A password authentication scheme over insecure networks. Journals of Computer and System Sciences 72, 727–740 (2006)
Shen, J.J., Lin, C.W., Hwang, M.S.: A modified remote user authentication scheme using smart cards. IEEE Trans, Consumer Electron 49(2), 414–416 (2003)
Xu, J., Zhu, W.-T., Feng, D.-G.: An improvement smart card based Password Authentication scheme with provable security. Computer Standard and Interfaces 31, 723–728 (2009)
Lampot: Password authentication with insecure communication. ACM 24(11), 770–772 (1981)
Gong, L.: A security risk of depending on synchronized clocks. Operating Systems Review 26(1), 49–53 (1992)
Sandirigama, M., Shimiz, A., Noda, M.T.: Simple and secure password authentication protocol. (SAS), IEICE Transactions on Communication E83-B(6), 1363–1365 (2000)
Haller, N.H.: The S/KEY(TM) one time password system. proc. In: Proc. Internet Society Symposium on Network and Distributed System Security, pp. 151–158 (1994)
Lee, N.Y., Chin, Y.C.: Improved RAS with smart cards. Computer Standards and Interface 27(2), 177–180 (2005)
Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 388. Springer, Heidelberg (1999)
Wu, S.T., Chieu, B.C.: A user friendly remote user authentication scheme with smart cards. Computers and Security 22(6), 547–550 (2003)
Lee, S.W., Kim, H.S., Yoo, K.Y.: Improvement of chien etal’s remote user authentication scheme using smart card. Computer Standards and Interface 27(2), 181–183 (2005)
Kim, S.K., Chung, M.G.: More secure remote user authentication scheme using smart cards. Journal of Computer and Communications, doi:10.10161-1 coman 2008.11.026
Kim, S.K., Chung, M.G.: More secure remote user authentication scheme. Computer Communication (2009)
Lee, S., Kim, H., Yoo, K.: Improvement of chen et’s remote user authentication scheme using smart cards. Computer Standards and Interface 27, 181–183 (2004)
Lee, S., Kim, H., Yoo, K.: Improved efficient remote user authentication scheme using smart card. IEEE Trans on Communication Electronics 50(2), 565–567 (2004)
Hwang, T., Chen, Y., Laih, C.S.: Non interactive password authentication without password tables. In: Proc. IEEE Region 10 Conference on Computer and Communication Systems, Hong Kong, pp. 429–431 (September 1990)
Chen, T.H., Lee, W.B.: A new method for using hash functions to solve remote user authentication. Computers and Electicals Engineering 34, 53–62 (2008)
Ku, W.C., Chen, S.N.: weakness and improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Trans on Consumer Electronics 50(1), 204–207 (2004)
Wang, X.M., Zhang, W.F., Zhang, J.S., Khan, M.K.: Cryptanalysis and improvement on two efficient remote user authentications scheme using smart cards. Computer Standards and Interfaces 29(5), 507–512 (2007)
Wang, X., Yin, Y.L., Yu, H.: Finding Collisons in the full SHA1 (February 2005), http://www.infosec.sdu.edu.en/paper/sha1
Wang, Y.J., Li, J.H., Tie, L.: Security analysis and improvement of a user friendly remote authentication protocol. Applied Mathematics and Computer (in press)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Srivastava, K., Awasthi, A.K., Mittal, R.C. (2013). A Review on Remote User Authentication Schemes Using Smart Cards. In: Singh, K., Awasthi, A.K. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37949-9_64
Download citation
DOI: https://doi.org/10.1007/978-3-642-37949-9_64
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37948-2
Online ISBN: 978-3-642-37949-9
eBook Packages: Computer ScienceComputer Science (R0)