About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
11th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness

Research Article

Cryptanalysis of Biometric-based Multi-server Authentication Scheme Using Smart Card

Download710 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/eai.19-8-2015.2260660,
        author={Jongho Mun and Jiye Kim and Donghoon Lee and Dongho Won},
        title={Cryptanalysis of Biometric-based Multi-server Authentication Scheme Using Smart Card},
        proceedings={11th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness},
        publisher={IEEE},
        proceedings_a={QSHINE},
        year={2015},
        month={9},
        keywords={remote user authentication biometric smart card network security},
        doi={10.4108/eai.19-8-2015.2260660}
    }
    
  • Jongho Mun
    Jiye Kim
    Donghoon Lee
    Dongho Won
    Year: 2015
    Cryptanalysis of Biometric-based Multi-server Authentication Scheme Using Smart Card
    QSHINE
    IEEE
    DOI: 10.4108/eai.19-8-2015.2260660
Jongho Mun1, Jiye Kim1, Donghoon Lee1, Dongho Won1,*
  • 1: Sungkyunkwan University
*Contact email: dhwon@security.re.kr

Abstract

Remote user authentication scheme is one of the most convenient authentication schemes to deal with secret data via insecure communication channel. During the last couple of decades, many researchers have proposed a remote user authentication schemes which are ID-based, password-based, and smart card-based. Above all, smart card-based remote user authentication schemes for multi-server environment are a widely used and researched method. One of the benefits of smart card-based authentication scheme is that a server does not have to keep a verifier table. Furthermore, remote user authentication scheme for multi-server environment has resolved the problem of users to manage the different identities and passwords. In 2015, Baruah et al. improved Mishra et al.'s scheme, and claimed that their scheme is more secure and practical remote user authentication scheme. However, we find that Baruah et al.'s scheme is still insecure. In this paper, we demonstrate that their scheme is vulnerable to outsider attack, smart card stolen attack, user impersonation attack and replay attack.

Keywords
remote user authentication biometric smart card network security
Published
2015-09-08
Publisher
IEEE
http://dx.doi.org/10.4108/eai.19-8-2015.2260660
Copyright © 2015–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL