Two efficient and secure authentication schemes using smart cards

Youngsook Lee, Junghyun Nam, Seung-Joo Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

A mutual authentication scheme is a two-party protocol designed to allow the communicating parties to confirm each other's identity over a public, insecure network, Passwords provide the most convenient means of authentication because they are easy for humans to remember. Whilst there have been many proposals for password authentication, they are vulnerable to various attacks and are neither efficient, nor user friendly, In this paper we propose two new password authentication schemes making use of smart cards: the timestamp-based authentication scheme (TBAS) and the nonce-based authentication scheme (NBAS), Both TEAS and NBAS provide many desirable features: (1) they do not require the server to maintain a password table for verifying the legitimacy of login users; (2) they allow users to choose their passwords according to their liking and hence give more user convenience; (3) they are extremely efficient in terms of the computational cost since the protocol participants perform only a few hash function operations; and (4) they achieve mutual authentication between the remote user and the server. In addition, NBAS does not require synchronized clocks between the remote user and the server.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages858-866
Number of pages9
Volume3984 LNCS
Publication statusPublished - 2006 Jul 20
Externally publishedYes
EventICCSA 2006: International Conference on Computational Science and Its Applications - Glasgow, United Kingdom
Duration: 2006 May 82006 May 11

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3984 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

OtherICCSA 2006: International Conference on Computational Science and Its Applications
CountryUnited Kingdom
CityGlasgow
Period06/5/806/5/11

Fingerprint

Illegitimacy
Smart cards
Smart Card
Authentication
Costs and Cost Analysis
Password
Password Authentication
Mutual Authentication
Server
Servers
Timestamp
Hash Function
Health Smart Cards
Network protocols
Computational Cost
Table
Hash functions
Choose
Attack
Clocks

Keywords

  • Authentication scheme
  • Mutual authentication
  • Password
  • Smart card

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Lee, Y., Nam, J., Kim, S-J., & Won, D. (2006). Two efficient and secure authentication schemes using smart cards. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3984 LNCS, pp. 858-866). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3984 LNCS).

Two efficient and secure authentication schemes using smart cards. / Lee, Youngsook; Nam, Junghyun; Kim, Seung-Joo; Won, Dongho.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3984 LNCS 2006. p. 858-866 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3984 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lee, Y, Nam, J, Kim, S-J & Won, D 2006, Two efficient and secure authentication schemes using smart cards. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 3984 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3984 LNCS, pp. 858-866, ICCSA 2006: International Conference on Computational Science and Its Applications, Glasgow, United Kingdom, 06/5/8.
Lee Y, Nam J, Kim S-J, Won D. Two efficient and secure authentication schemes using smart cards. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3984 LNCS. 2006. p. 858-866. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Lee, Youngsook ; Nam, Junghyun ; Kim, Seung-Joo ; Won, Dongho. / Two efficient and secure authentication schemes using smart cards. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3984 LNCS 2006. pp. 858-866 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{7909697b2f5c4c82ac694749cbd8ca3e,
title = "Two efficient and secure authentication schemes using smart cards",
abstract = "A mutual authentication scheme is a two-party protocol designed to allow the communicating parties to confirm each other's identity over a public, insecure network, Passwords provide the most convenient means of authentication because they are easy for humans to remember. Whilst there have been many proposals for password authentication, they are vulnerable to various attacks and are neither efficient, nor user friendly, In this paper we propose two new password authentication schemes making use of smart cards: the timestamp-based authentication scheme (TBAS) and the nonce-based authentication scheme (NBAS), Both TEAS and NBAS provide many desirable features: (1) they do not require the server to maintain a password table for verifying the legitimacy of login users; (2) they allow users to choose their passwords according to their liking and hence give more user convenience; (3) they are extremely efficient in terms of the computational cost since the protocol participants perform only a few hash function operations; and (4) they achieve mutual authentication between the remote user and the server. In addition, NBAS does not require synchronized clocks between the remote user and the server.",
keywords = "Authentication scheme, Mutual authentication, Password, Smart card",
author = "Youngsook Lee and Junghyun Nam and Seung-Joo Kim and Dongho Won",
year = "2006",
month = "7",
day = "20",
language = "English",
isbn = "3540340793",
volume = "3984 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "858--866",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Two efficient and secure authentication schemes using smart cards

AU - Lee, Youngsook

AU - Nam, Junghyun

AU - Kim, Seung-Joo

AU - Won, Dongho

PY - 2006/7/20

Y1 - 2006/7/20

N2 - A mutual authentication scheme is a two-party protocol designed to allow the communicating parties to confirm each other's identity over a public, insecure network, Passwords provide the most convenient means of authentication because they are easy for humans to remember. Whilst there have been many proposals for password authentication, they are vulnerable to various attacks and are neither efficient, nor user friendly, In this paper we propose two new password authentication schemes making use of smart cards: the timestamp-based authentication scheme (TBAS) and the nonce-based authentication scheme (NBAS), Both TEAS and NBAS provide many desirable features: (1) they do not require the server to maintain a password table for verifying the legitimacy of login users; (2) they allow users to choose their passwords according to their liking and hence give more user convenience; (3) they are extremely efficient in terms of the computational cost since the protocol participants perform only a few hash function operations; and (4) they achieve mutual authentication between the remote user and the server. In addition, NBAS does not require synchronized clocks between the remote user and the server.

AB - A mutual authentication scheme is a two-party protocol designed to allow the communicating parties to confirm each other's identity over a public, insecure network, Passwords provide the most convenient means of authentication because they are easy for humans to remember. Whilst there have been many proposals for password authentication, they are vulnerable to various attacks and are neither efficient, nor user friendly, In this paper we propose two new password authentication schemes making use of smart cards: the timestamp-based authentication scheme (TBAS) and the nonce-based authentication scheme (NBAS), Both TEAS and NBAS provide many desirable features: (1) they do not require the server to maintain a password table for verifying the legitimacy of login users; (2) they allow users to choose their passwords according to their liking and hence give more user convenience; (3) they are extremely efficient in terms of the computational cost since the protocol participants perform only a few hash function operations; and (4) they achieve mutual authentication between the remote user and the server. In addition, NBAS does not require synchronized clocks between the remote user and the server.

KW - Authentication scheme

KW - Mutual authentication

KW - Password

KW - Smart card

UR - http://www.scopus.com/inward/record.url?scp=33745960098&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33745960098&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:33745960098

SN - 3540340793

SN - 9783540340799

VL - 3984 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 858

EP - 866

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -