CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME



Similar documents
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card

A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC

SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER

A SMART CARD-BASED MOBILE SECURE TRANSACTION SYSTEM FOR MEDICAL TREATMENT EXAMINATION REPORTS. Received January 2010; revised May 2010

On the Security Vulnerabilities of a Hash Based Strong Password Authentication Scheme

A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key

Cryptography. Debiao He. School of Mathematics and Statistics, Wuhan University, Wuhan, People s Republic of China. hedebiao@163.

An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography

Efficient Nonce-based Authentication Scheme for. session initiation protocol

Efficient nonce-based authentication scheme for Session Initiation Protocol

SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT

Secure Authentication of Distributed Networks by Single Sign-On Mechanism

Device-based Secure Data Management Scheme in a Smart Home

International Journal of Software and Web Sciences (IJSWS)

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

Authenticated Key Agreement Based on NFC for Mobile Payment

Authentication protocol for fingerprint feature extraction and IBC in monitoring systems

The Design of Web Based Secure Internet Voting System for Corporate Election

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK

Multi-Factor User Authentication in Wireless Sensor Networks

A secure login system using virtual password

Authentication and Authorization Applications in 4G Networks

Single Sign-On Secure Authentication Password Mechanism

An Efficient Implementation For Key Management Technique Using Smart Card And ECIES Cryptography

One Time Password Generation for Multifactor Authentication using Graphical Password

An Efficient Data Correctness Approach over Cloud Architectures

A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications

Signature Amortization Technique for Authenticating Delay Sensitive Stream

Secure File Transfer Using USB

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE

Client Server Registration Protocol

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

Multi Factor Authentication Protocols for a Secured Wsn

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014

Apache Milagro (incubating) An Introduction ApacheCon North America

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

SECUDROID - A Secured Authentication in Android Phones Using 3D Password

Capture Resilient ElGamal Signature Protocols

Enhanced Model of SQL Injection Detecting and Prevention

Chapter 16: Authentication in Distributed System

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

A Study on User Access Control Method using Multi-Factor Authentication for EDMS

Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Research Article. Research of network payment system based on multi-factor authentication

Cryptanalysis and security enhancement on the generation of Mu-Varadharajan electronic voting protocol. Vahid Jahandideh and Amir S.

A Secure Authenticate Framework for Cloud Computing Environment

A Proxy-Based Data Security Solution in Mobile Cloud

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

How To Use Kerberos

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

A secure user authentication protocol for sensor network in data capturing

An Approach towards Security in Private Cloud Using OTP

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

AN INVESTIGATION OF SECURITY THEME FOR CLOUD COMPUTING

CPSC 467b: Cryptography and Computer Security

ISSN: (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies

Design and Implementation of Automatic Attendance Check System Using BLE Beacon

Side Channel Analysis and Embedded Systems Impact and Countermeasures

Research Article Secure Authentication System for Hybrid Cloud Service in Mobile Communication Environments

Secure Cloud Architecture for Preserving Privacy in Cloud Computing using OTPWTP

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Journal of Electronic Banking Systems

An Anti-Phishing mechanism for Single Sign-On based on QR-Code

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

RSA Attacks. By Abdulaziz Alrasheed and Fatima

Cryptography and Network Security

Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan

Security in Electronic Payment Systems

Integration of Sound Signature in 3D Password Authentication System

Transcription:

CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME Mohammed Aijaz Ahmed 1, D. Rajya Lakshmi 2 and Sayed Abdul Sattar 3 1 Department of Computer Science and Engineering, GITAM University, Vishakapatnam mohd_aijaz@yahoo.com 2 Department of Information Technology, GITAM University, Vishakapatnam rdavuluri@yahoo.com 3 Department of Computer Science and Engineering, J.N.T. University, Hyderabad syed49in@yahoo.com ABSTRACT In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which has many advantage such as no verifier table, user freedom to choose and change password and so on. However the subsequent papers have shown that this scheme is completely insecure and vulnerable to many attacks. Since then many schemes with improvements to Das et al s scheme has been proposed but each has its pros and cons. Recently Yan-yan Wang et al. have proposed a scheme to overcome security weaknesses of Das et al. s scheme. However this scheme too is vulnerable to various security attacks such as password guessing attack, masquerading attack, denial of service attack. KEYWORDS Password, Authentication, Smartcard, Remote User, Masquerade Attack 1. INTRODUCTION In order to prevent the invasion of privacy and solve security problems, a remote user would need to provide proof to a system that he/she is a legitimate user before he/she logs onto the remote system. There are many methods proposed to verify the legitimacy of a remote user such as password, fingerprint, typing sequence, and so forth. Among them, password based remote user authentication is extensively used and easily implemented to authenticate a legitimate user. In 1981, Lamport [3] proposed a password based authentication scheme that could authenticate remote users over a insecure channel. Since than many schemes [6, 7, 8, 9] have been proposed to improve security, efficiency, and cost. In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme [2] which has many advantage such as no verifier table, user freedom to choose and change password and so on. However the subsequent papers [4,5] have shown that this scheme is completely insecure and vulnerable to many attacks. Since then many schemes[1,4] with improvements to Das et al s scheme has been proposed but each has its pros and cons. Recently Yan-yan Wang et al. [1] have proposed a scheme to overcome security weaknesses of Das et al. s scheme. However in this paper we state that this scheme too is vulnerable to few security attacks such as password guessing attack, masquerading attack, denial of service attack. 32

The rest of the paper is organized as follows. In section 2 we present review of Yan-yan Wang et al. s scheme. The section 3 describes cryptanalysis of Yan-yan Wang et al. s scheme. And finally some concluding comments are included in the last section. 2. Review OF YAN-YAN WANG ET AL. S SCHEME The scheme consists of four phases, the registration phase, the login phase, the verification phase and password change phase. The notations used in the scheme are as follows: U PW ID S h(.) => A B: M A => B: M The user The password of U The identity of U The remote server A one-way hash function Bitwise XOR operation A common channel A secure channel A sends M to B through common channel A sends M to B through secure channel 2.1. Registration Phase The user Ui sends the registration request to the remote server S: 1) Ui submits IDi to S 2) S computes: Ni = h(pwi) h(x) IDi Where x is secret of remote server, PWi is the password of Ui chosen by S. 3) S personalizes the smartcard with the parameters [h(.), Ni, y ], where y is the remote server s secret number stored in each registered user s smartcard. 4) S => Ui: PWi and smartcard. 2.2. Login Phase When a user wants to login the remote server, he/she inserts the smart card to the terminal and keys the identity IDi and the password PWi, then the smartcard performs the following steps: 1) Computes dynamic ID: CIDi = h(pwi) h(niθyθ T) IDi Where T is the current date and time. 2) Ui S: IDi, CIDi,Ni,T 33

2.3. Verification Phase When the remote server S receives the request (IDi,CIDi,Ni,T) at time T, S verifies as: 1) checks the validity of time interval, if T T T holds, S accepts the login request of Ui, otherwise the login request will be rejected, where T is valid time interval. 2) S computes: 3) and computes h (PWi) = CIDi h(niθyθ T) IDi IDi = Ni h (PWi) h(x) and verifies whether it is equal to IDi in the login request of Ui. If it does not hold S rejects the login request of Ui, otherwise accepts it. Then S computes a using the result of step 2. a = h (h (PWi) y T ) 4) S sends (a,t) to Ui. Upon receiving the reply message (a,t) at time T*, Ui verifies as: 5) Ui checks whether T* T T, if it does then Ui computes a = h(h(pwi) y T ), and compares it with the received a, if it holds, Ui confirms that S is valid. 2.4. Password Change Phase When the user wants to change the password, he/she inserts the smartcard into the terminal device, keys the password PWi and request to change the password to new one PWnew, then the smartcard computes: Ni* = Ni h(pwi) h(pwnew), and replaces the Ni with the new Ni*, password gets changed. 3. CRYPTANALYSIS OF YAN-YAN WANG ET AL. S SCHEME In this section we will show that Yan-yan Wang et al. s scheme is vulnerable to masquerade attack, password guessing attack, denial of service attack. Although tamper resistant smartcard widely assumed in most of the authentication scheme, but such an assumption is difficult in practice. Many researchers have shown that the secret stored in a smartcard can be breached by analyzing the leaked information or by monitoring the power consumption [10,11]. An attacker can extract secret y stored in the Ui s smartcard either by stealing the smartcard or by registering to the server (as each registered user has same value of y stored in their smartcard). 3.1. Password guessing attack Assuming that the attacker has extracted the secret y from Ui s smartcard and also he/she has the intercepted parameters, CIDi, Ni, T and IDi. Then the attacker can proceed as follows: h(pwi)= CIDi h(ni y T) IDi 34

Now attacker can guess different passwords until the hash value of the guessed password matches with h(pwi) computed by the attacker. 3.2. User Masquerade Attack In the second step of registration phase S computes: Ni = h(pwi) h(x) IDi The attacker can now extract h(x) from Ni by using h(pwi) computed in A : h(x) = h(pwi) Ni IDi now attacker can calculate new Ni* with his/her choosen password PW* as follows: Ni* = h(pwi*) h(x) IDi Attacker can now create and send a forged login request to the remote server S, without knowing the original password: CIDi* = h(pwi*) h(ni* y T*) IDi where T* is fresh time stamp. Attacker sends to the server S, {CIDi*,Ni*,T*, IDi}. Upon receiving login request Server S successfully verifies validity of timestamp T *and identity IDi, hence accepting the request. 3.3. Server Masquerade Attack The attacker can masquerade server by using the h(pwi) computed in A and : a* = h (h(pwi) y T ) Attacker then sends (a*,t ) to Ui, which the user successfully verifies. 3.4. Denial of Service Attack The password change phase of Yan-yan Wang et al. s scheme is same as that of Das et al. s scheme and it has a serious weakness. The password change phase does not verify whether the input old password matches with the original password. An attacker can use Ui s smartcard in his absence and can invoke password change phase by inputting an arbitrary password PW in place of original password PWi along with a new password PWnew. Then the smartcard updates Ni without verifying the old password as follows: Ni* = Ni h(pw ) h(pwnew) That will result in some arbitrary value Ni*.Now the original user Ui can not log onto the remote server even by using his correct password as the Ni has been changed to some arbitrary value. 35

3. CONCLUSION In this paper, we briefly reviewed Yan-yan Wang et al. s scheme and shown that this improved scheme too is vulnerable to various security attacks such as password guessing attack, user masquerade attack, server masquerade attack, denial of service attack. In addition to this the password change phase updates smartcard parameter even if wrong password is given as input. REFERENCES [1] Yan-yan Wang, Jia-yong Liu, Feng-xia Xia, Jing Dan, (2009) A more efficient and secure dynamic ID-based remote user authentication scheme, Computer communications, Vol. 32, pp. 583-585. [2] M. L. Das, A. Saxena, V. P. Gulati, (2004) A dynamic ID-based remote user authentication scheme, IEEE Trans. Consumer Electron., Vol. 50, No. 2, pp. 629-63. [3] L. Lamport, (1981), password authentication with insecure communication, Communications of the ACM, Vol. 24, No. 11, pp. 770-772. [4] I-En Liao, C. C. Lee and M. S. Hwang, (2005), Security enhancement for a dynamic ID-based remote user authentication scheme, in IEEE CS Press, NWeSP 05, pp. 437-440, Seoul, Korea. [5] A. K. Awasthi, S. Lal, (2004), Security analysis of a dynamic ID based remote user authentication scheme, http://eprint.iacr.org/2004/238.pdf. [6] H. M. Sun, (2000), An efficient remote user authentication scheme using smart card, IEEE Trans. Consumer Elec., Vol. 46, no. 1, pp. 28-30. [7] W. C. Ku, S. M. Chen, (2004), weaknesses and improvements of an efficient password based remote user authentication scheme using smartcards, IEEE Trans. on Consumer Electron., Vol. 50, No. 1, pp. 204-206. [8] Y. L. Tang, M. S. Hwang, C. C. Lee, (2002), A simple remote user authentication scheme, Mathematical and Computer Modeling, Vol. 36, pp. 103-107. [9] C. C. Lee, L. H. Lee, M. S. Hwang, (2002), A remote user authentication scheme using hash functions, ACM Operating System Review, vol. 36, No. 4. [10] P. Kocher, J. Jaffe, B. B. Jun, (1999), Differential power analysis, Proceedings of Advances in Cryptology (CRYPTO 99), pp. 388-397. [11] T. S. Messerges, E.A. Dabbish, R.H. Sloan,(2002), Examining smartcard security under the threat of power analysis attacks, IEEE Trans. on Computers, Vol. 51, No. 5, pp. 541-552. 36

Authors 1 Md. Aijaz Ahmed received his B.E. Degree in Computer Science & Engineering from, M.B.E.S College of Engineering, Ambejogai, Maharashtra, India in 2003; He has obtained M.E. in Computer Science & Engineering from, M.G.M s College of Engineering, S.R.T.M. University, Nanded, Maharashtra, India. He is currently pursuing Ph.D. in Computer Science & Engineering from GITAM University Vishakapatnam, Andhra Pradesh, India. His area of interest includes Network Security and Cryptography, Discrete Mathematics, Automata Theory. 2 Dr. D. Rajya Lakshmi is working presently as professor in Department of Information Technology at GITAM University, Visakhapatnam, AP, INDIA. Professor Rajya Lakshmi was awarded Ph.d in CSE from JNTU, Hyderabad. She has 16 years of teaching experience. Her research areas includes Image processing, Data mining, Network security. 3 Dr. Syed Abdul Sattar received B.E. (Electronics) from Marathwada University, Aurangabad, Maharashtra, India, in 1990. He received M.Tech. in Digital system and Computer Science from J.N.T. University, Hyderabad, Andhra Pradesh, India, in 2002. He received Ph.D. in Electronics & Communication Engg. from J.N.T. University, Hyderabad, in 2007. His area of interest include Computer Communications, Network Security, Image Processing. 37