본문 바로가기
  • Home

Weaknesses Cryptanalysis of Khan's Scheme and Improved Authentication Scheme preserving User Anonymity

  • Journal of The Korea Society of Computer and Information
  • Abbr : JKSCI
  • 2013, 18(2), pp.87-94
  • Publisher : The Korean Society Of Computer And Information
  • Research Area : Engineering > Computer Science

박미옥 1

1성결대학교

Accredited

ABSTRACT

In this paper, we analyse the weaknesses of authentication scheme preserving user anonymity proposed by Khan et al in 2011 and we propose a new authentication schemes preserving user anonymity that improved these weaknesses. Khan et al's authentication scheme is vulnerable to insider attack and doesn't provide user anonymity to the server. Also, this scheme is still a weakness of wrong password input by mistake in spite of proposing the password change phase. In this paper,we will show that Khan et al's scheme is vulnerable to the stolen smart card attack and the strong server/user masquerade attack. The proposed authentication scheme propose the improved user anonymity, which can provide more secure privacy to user by improving these weaknesses.

Citation status

* References for papers published after 2023 are currently being built.