作者: Xiong Li , Junguo Liao , Saru Kumari , Wei Liang , Fan Wu
DOI: 10.1007/S11277-015-2737-Z
关键词: Authentication protocol 、 Multi-factor authentication 、 S/KEY 、 Provable security 、 Password policy 、 Computer science 、 Authentication 、 Password 、 Login 、 Challenge–response authentication 、 Data Authentication Algorithm 、 Random oracle 、 Cryptanalysis 、 One-time password 、 Denial-of-service attack 、 AKA 、 Computer security
摘要: The remote user authentication scheme is an important security technology, which provides service before a accesses the provided by server. In this paper, we analyze and design flaws of recently proposed dynamic ID key agreement Lin. We find Lin's totally cannot be used in real applications because following weaknesses: it has some drawbacks such as does not have wrong password detection mechanism its change phase incorrect; can login to server using any identity or inherent defects message; at same time, vulnerable mobile device loss attack denial attack. For considerations, propose principles should followed schemes. According these principles, new ID-based device. formally features BAN logic, give provable analysis random oracle model. Besides, also discuss our resist other well known attacks. functionality performance comparisons shown that enhances keeps efficiency time.