@article{ART001735152},
author={Kwang Cheul Shin},
title={Vulnerability Analysis and Improvement of a Remote User Authentication Scheme by Legitimate Members (Oriented Chien & Bindu et al.’s protocol)},
journal={Journal of Knowledge Information Technology and Systems},
issn={1975-7700},
year={2012},
volume={7},
number={6},
pages={181-192}
TY - JOUR
AU - Kwang Cheul Shin
TI - Vulnerability Analysis and Improvement of a Remote User Authentication Scheme by Legitimate Members (Oriented Chien & Bindu et al.’s protocol)
JO - Journal of Knowledge Information Technology and Systems
PY - 2012
VL - 7
IS - 6
PB - Korea Knowledge Information Technology Society
SP - 181
EP - 192
SN - 1975-7700
AB - The password and nonce based method of certification has been studied for a long time in the field of remote user authentication and the study for guaranteeing user's anonymity has recently been under way. In 2004 Das et al.’s carried out the study for guaranteeing anonymity using dynamic ID and in 2005 Chien et al.’s proposed an improved protocol. In 2008 Bindu et al.’s suggested a new protocol pointing out that the protocol proposed by Chien et al.’s was vulnerable to the attack from insider and man-in-the-middle attack. This paper points out the vulnerability of the protocol proposed by Chien and Bindu et al.’s and suggests an improved protocol producing nonce for guaranteeing the security of secret key and keeping the secret key indecipherable by using the padding. It also increase efficiency of calculation by removing exponentation operation and increase efficiency of protocol by making it possible to change user's password randomly.
KW - Authentication;impersonation attack;Man-in-the-middle attack. replay attack;Anonymity
DO -
UR -
ER -
Kwang Cheul Shin. (2012). Vulnerability Analysis and Improvement of a Remote User Authentication Scheme by Legitimate Members (Oriented Chien & Bindu et al.’s protocol). Journal of Knowledge Information Technology and Systems, 7(6), 181-192.
Kwang Cheul Shin. 2012, "Vulnerability Analysis and Improvement of a Remote User Authentication Scheme by Legitimate Members (Oriented Chien & Bindu et al.’s protocol)", Journal of Knowledge Information Technology and Systems, vol.7, no.6 pp.181-192.
Kwang Cheul Shin "Vulnerability Analysis and Improvement of a Remote User Authentication Scheme by Legitimate Members (Oriented Chien & Bindu et al.’s protocol)" Journal of Knowledge Information Technology and Systems 7.6 pp.181-192 (2012) : 181.
Kwang Cheul Shin. Vulnerability Analysis and Improvement of a Remote User Authentication Scheme by Legitimate Members (Oriented Chien & Bindu et al.’s protocol). 2012; 7(6), 181-192.
Kwang Cheul Shin. "Vulnerability Analysis and Improvement of a Remote User Authentication Scheme by Legitimate Members (Oriented Chien & Bindu et al.’s protocol)" Journal of Knowledge Information Technology and Systems 7, no.6 (2012) : 181-192.
Kwang Cheul Shin. Vulnerability Analysis and Improvement of a Remote User Authentication Scheme by Legitimate Members (Oriented Chien & Bindu et al.’s protocol). Journal of Knowledge Information Technology and Systems, 7(6), 181-192.
Kwang Cheul Shin. Vulnerability Analysis and Improvement of a Remote User Authentication Scheme by Legitimate Members (Oriented Chien & Bindu et al.’s protocol). Journal of Knowledge Information Technology and Systems. 2012; 7(6) 181-192.
Kwang Cheul Shin. Vulnerability Analysis and Improvement of a Remote User Authentication Scheme by Legitimate Members (Oriented Chien & Bindu et al.’s protocol). 2012; 7(6), 181-192.
Kwang Cheul Shin. "Vulnerability Analysis and Improvement of a Remote User Authentication Scheme by Legitimate Members (Oriented Chien & Bindu et al.’s protocol)" Journal of Knowledge Information Technology and Systems 7, no.6 (2012) : 181-192.