본문 바로가기
  • Home

Design Errors and Cryptanalysis of Shin’s Robust Authentication Scheme based Dynamic ID for TMIS

  • Journal of The Korea Society of Computer and Information
  • Abbr : JKSCI
  • 2021, 26(10), pp.101-108
  • DOI : 10.9708/jksci.2021.26.10.101
  • Publisher : The Korean Society Of Computer And Information
  • Research Area : Engineering > Computer Science
  • Received : September 6, 2021
  • Accepted : September 29, 2021
  • Published : October 29, 2021

Mi-Og Park 1

1성결대학교

Accredited

ABSTRACT

In this paper, we analyze Shin's proposed dynamic ID-based user authentication scheme for TMIS(Telecare Medicine Information System), and Shin's authentication scheme is vulnerable to smart card loss attacks, allowing attackers to acquire user IDs, which enables user impersonation attack. In 2019, Shin's proposed authentication scheme attempted to generate a strong random number using ECC, claiming that it is safe to lose a smart card because it is impossible to calculate random number r'i due to the difficulty of the ECC algorithm without knowing random number ri. However, after analyzing Shin's authentication scheme in this paper, the use of transmission messages and smart cards makes it easy to calculate random numbers r'i, which also enables attackers to generate session keys. In addition, Shin's authentication scheme were analyzed to have significantly greater overhead than other authentication scheme, including vulnerabilities to safety analysis, the lack of a way to pass the server's ID to users, and the lack of biometric characteristics with slightly different templates.

Citation status

* References for papers published after 2023 are currently being built.