2014
DOI: 10.1002/dac.2858
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis and security enhancement of a robust two‐factor authentication and key agreement protocol

Abstract: Summary Two‐factor user authentication scheme allows a user to use a smart card and a password to achieve mutual authentication and establish a session key between a server and a user. In 2012, Chen et al. showed that the scheme of Sood et al. does not achieve mutual authentication and is vulnerable to off‐line password guessing and smart card stolen attacks. They also found that another scheme proposed by Song is vulnerable to similar off‐line password guessing and smart card stolen attacks. They further prop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 34 publications
(22 citation statements)
references
References 24 publications
0
22
0
Order By: Relevance
“…ProVerif is an automated tool which make use of applied p calculus to verify cryptographic protocols [36]. ProVerif can verify trace equivalences like reachability, authentication and secrecy to prove a given protocol cannot reach to a bad state [37]. ProVerif can also be used to prove observational equivalences like anonymity & privacy [38,39].…”
Section: Protocol Verification Using Proverifmentioning
confidence: 99%
“…ProVerif is an automated tool which make use of applied p calculus to verify cryptographic protocols [36]. ProVerif can verify trace equivalences like reachability, authentication and secrecy to prove a given protocol cannot reach to a bad state [37]. ProVerif can also be used to prove observational equivalences like anonymity & privacy [38,39].…”
Section: Protocol Verification Using Proverifmentioning
confidence: 99%
“…Maitra et al 's work [18] just ignored this problem and supposed that the adversary can never learn about the long term secret key; as, for Amin's work, he assumed that a valid user can always know the secret information and may provide it to the adversary, while, in fact, these two statements are both not accurate enough. A widely accepted assumption is that an adversary can know the long term secret key only when evaluating the forward secrecy [28][29][30][31][32].…”
Section: Adversary Modelmentioning
confidence: 99%
“…Fortunately, ProVerif is one of the best tools to examine security protocols. It can be used to analyze different security aspects like secrecy []. It can deal with most of the symmetric cryptography primitives.…”
Section: Protocol Verification Through Proverifmentioning
confidence: 99%
“…[]. Subsequently, a large number of smart card‐based authentication schemes are proposed [,]. The past research on authentication has ascertained that the development of a correct authentication scheme is exceptionally difficult [] as smart card is a very small device equipped with limited computation, memory, and power resources.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation