Skip to main content

A Review on Remote User Authentication Schemes Using Smart Cards

  • Conference paper
Quality, Reliability, Security and Robustness in Heterogeneous Networks (QShine 2013)

Abstract

Remote user authentication is a mechanism in which the remote server verifies the legitimacy of a user over an insecure communication channel. Password based authentication schemes have been widely deployed to verify the legitimacy of remote users as password authentication is one of the simplest and the most convenient authentication mechanism over insecure networks. In remote user authentication scheme, the user is assigned a smart card, which is being personalized by some parameters and provide the legal users to use the resources of the remote system. Until now, there have been ample of remote user authentication schemes published in the literature and each published schemes have its own merits and demerits. Recently, many schemes proposed are based on the one-way hash function. The computational complexity of their schemes is superior to the discrete logarithm-problem-based schemes. In our paper, we have defined all the security requirements and the goals. An ideal password authentication schemes should satisfy and achieve all of these. We have presented the results of our survey through five of the currently available secure one way hash function based remote user authentication schemes. We hope an ideal smart card (not storing (ID i ,PW i ), which meets all the security requirements and achieves all the goals can be developed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shimizu, A.: A dynamic password authentication method by one way function. IEICE Transactions 173-D-1(7), 630–636 (1990)

    Google Scholar 

  2. Hsu, C.-L.: Security of chien et al.’s remote user authentication scheme using smart cards. Computer Standards and Interfaces 26, 167–169 (2004)

    Article  Google Scholar 

  3. Hsu, C.L.: A user friendly Remote User Authentication scheme with smart cards against impersonation attacks. Applied Mathematical and Computer 170, 135–143 (2005)

    MathSciNet  MATH  Google Scholar 

  4. Chan, C.K., Chang, L.M.: Cryptanalysis of a Remote user authentication scheme using smart card using smart cards. IEEE Trans, Consumer Electron 46, 992–993 (2000)

    Article  Google Scholar 

  5. Li, C.T., Hwang, M.S.: An efficient biometric based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 33(1), (5) (January 2010)

    Google Scholar 

  6. Hsu, C.L.: Security of Chien et al’s remote user authentication scheme using smart cards. Computer Standard and Interfaces 26(3), 167–169 (2004)

    Article  Google Scholar 

  7. Sun, D.-Z., et al.: Weakness and improvement on wang-Li-Tie’s user friendly remote authentication scheme. Applied Mathematics and Computation 170, 1185–1193 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  8. Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Further improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Trans on Consumer Electronics 50(2), 612–614 (2004)

    Article  Google Scholar 

  9. Yoon, E., Yoo, K.: More efficient and secure remote user authentication scheme using smart card. In: Proceeding of 11th International Conference on Parallel and Distributed System, vol. 2, pp. 73–77 (2005)

    Google Scholar 

  10. Hwang, Hwang, L.M.S., Li, L.H.: A new remote user authentication scheme using smart card. IEEE Transactions on Consumer Electronics 46(1), 28–30 (2000)

    Article  Google Scholar 

  11. Sun, H.M.: An efficient remote user authentication scheme using smart card. IEEE Trans on Consumer Electronic 46(4) (2000)

    Google Scholar 

  12. Chien, H.Y., Jan, J.K., Tseng, Y.M.: An efficient and practical solution to remote authentication: smart cards. Computer and Security 21(4), 372–375 (2002)

    Article  Google Scholar 

  13. I-En-Liao, C.-C., Lee, N.-S., Hwang, N.-S.: A password authentication scheme over insecure networks. Journals of Computer and System Sciences 72, 727–740 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  14. Shen, J.J., Lin, C.W., Hwang, M.S.: A modified remote user authentication scheme using smart cards. IEEE Trans, Consumer Electron 49(2), 414–416 (2003)

    Article  Google Scholar 

  15. Xu, J., Zhu, W.-T., Feng, D.-G.: An improvement smart card based Password Authentication scheme with provable security. Computer Standard and Interfaces 31, 723–728 (2009)

    Article  Google Scholar 

  16. Lampot: Password authentication with insecure communication. ACM 24(11), 770–772 (1981)

    Article  Google Scholar 

  17. Gong, L.: A security risk of depending on synchronized clocks. Operating Systems Review 26(1), 49–53 (1992)

    Article  Google Scholar 

  18. Sandirigama, M., Shimiz, A., Noda, M.T.: Simple and secure password authentication protocol. (SAS), IEICE Transactions on Communication E83-B(6), 1363–1365 (2000)

    Google Scholar 

  19. Haller, N.H.: The S/KEY(TM) one time password system. proc. In: Proc. Internet Society Symposium on Network and Distributed System Security, pp. 151–158 (1994)

    Google Scholar 

  20. Lee, N.Y., Chin, Y.C.: Improved RAS with smart cards. Computer Standards and Interface 27(2), 177–180 (2005)

    Article  Google Scholar 

  21. Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 388. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  22. Wu, S.T., Chieu, B.C.: A user friendly remote user authentication scheme with smart cards. Computers and Security 22(6), 547–550 (2003)

    Article  Google Scholar 

  23. Lee, S.W., Kim, H.S., Yoo, K.Y.: Improvement of chien etal’s remote user authentication scheme using smart card. Computer Standards and Interface 27(2), 181–183 (2005)

    Article  Google Scholar 

  24. Kim, S.K., Chung, M.G.: More secure remote user authentication scheme using smart cards. Journal of Computer and Communications, doi:10.10161-1 coman 2008.11.026

    Google Scholar 

  25. Kim, S.K., Chung, M.G.: More secure remote user authentication scheme. Computer Communication (2009)

    Google Scholar 

  26. Lee, S., Kim, H., Yoo, K.: Improvement of chen et’s remote user authentication scheme using smart cards. Computer Standards and Interface 27, 181–183 (2004)

    Article  Google Scholar 

  27. Lee, S., Kim, H., Yoo, K.: Improved efficient remote user authentication scheme using smart card. IEEE Trans on Communication Electronics 50(2), 565–567 (2004)

    Google Scholar 

  28. Hwang, T., Chen, Y., Laih, C.S.: Non interactive password authentication without password tables. In: Proc. IEEE Region 10 Conference on Computer and Communication Systems, Hong Kong, pp. 429–431 (September 1990)

    Google Scholar 

  29. Chen, T.H., Lee, W.B.: A new method for using hash functions to solve remote user authentication. Computers and Electicals Engineering 34, 53–62 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  30. Ku, W.C., Chen, S.N.: weakness and improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Trans on Consumer Electronics 50(1), 204–207 (2004)

    Article  Google Scholar 

  31. Wang, X.M., Zhang, W.F., Zhang, J.S., Khan, M.K.: Cryptanalysis and improvement on two efficient remote user authentications scheme using smart cards. Computer Standards and Interfaces 29(5), 507–512 (2007)

    Article  Google Scholar 

  32. Wang, X., Yin, Y.L., Yu, H.: Finding Collisons in the full SHA1 (February 2005), http://www.infosec.sdu.edu.en/paper/sha1

  33. Wang, Y.J., Li, J.H., Tie, L.: Security analysis and improvement of a user friendly remote authentication protocol. Applied Mathematics and Computer (in press)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Srivastava, K., Awasthi, A.K., Mittal, R.C. (2013). A Review on Remote User Authentication Schemes Using Smart Cards. In: Singh, K., Awasthi, A.K. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37949-9_64

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37949-9_64

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37948-2

  • Online ISBN: 978-3-642-37949-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics