You are on page 1of 3

IEEE Int.

Conference Neural Networks & Signal Processing


Zhenjiang, China, June 8~10, 2008

Security Analysis of a Remote User Authentication


Scheme Using Smart Card
Canyan ZHU Lihua ZHANG
School of EI Engineering, Soochow University, School of EE Engineering, East China Jiaotong Uni.
Suzhou 215021, P.R.China Nanchang 330013, P.R.China
cyzhu@sohu.com hbzlh@163.com

Abstract— Chien et al proposed an efficient and practical user; AS denotes authentication server; RS denotes register’s
remote authentication using smart cards. In 2004, Ku et al system; n denotes the number of times U re-registers to AS ;
pointed out that Chien et al’s scheme is insecure, and proposed ID denotes the identity of U; PW denotes the password of U;
an improved password-based remote user authentication scheme.
In this paper, the security of Ku’s scheme is analyzed. It is x denotes the permanent secret key of RS ; h(·) represents a
demonstrated that Ku’s scheme still has some weaknesses: cryptographic hash function.The three phases are executed as
it cannot withstand against the parallel session attack; it is follows:
vulnerable to the password guessing attacks and another new
attack; it cannot resist on changing time stamp attack. It is A. Registration Phase
then concluded that Ku’s scheme cannot achieve the security
The phase is invoked whenever a user initially registers or
requirements as their claims. Based on the analysis, we find all
the attacks are happened because of the simple computation re-registers to the system. U inserts his smart card to the reader
of h(ci ⊕ T j ) in all the phases of remote authentication, of the registers’ system and keys in his identity ID and his
thus we develop a hyper-complex chaotic hash scheme. It is password PW. The system and U then perform the following
evidently shown that the security of the improved remote user operations:
authentication scheme is efficiently enhanced.
1) U selects a random number b and computes h(b ⊕ PW).
Keyword— Cryptanalysis, authentication, security, chaotic map Where the symbol ⊕ denotes the bitwise exclusive-or
operation for two bit-strings.
2) U submits message x = (ID, h(b ⊕ PW)) to RS in secure
I. INTRODUCTION
I channel.
A remote password authentication scheme is to authenticate 3) If it is U’s initial registration, RS creates an entry for U
the legitimacy of the remote users over an insecure channel. in the account database and stores n = 0 in this entry,
In such a system, the password is often regarded as a secret otherwise, RS sets n = n + 1 in the existing entry for U.
shared between the authentication server (AS ) and the remote Next, RS computes R = h(EID ⊕ x) ⊕ h(b ⊕ PW), where
user. With the knowledge of the password, the remote user EID = (ID k n).
can use it to create and send a valid login message to AS 4) RS sends R back to U via a secure channel and then
for gaining the access right. On the other hand, AS uses the issues a smart card containing R, h(·) and b. Note that
shared password to check the validity of the login message for U’s smart card contains R, h(·) and b.
authenticating the remote user. In 2002, Chien et al proposed
an efficient and practical remote authentication using smart B. Login Phase
cards[2]. This scheme can provide mutual authentication and This phase is invoked whenever U logins AS for gaining
let users freely choose their passwords. In [1], Ku et al pointed access right. U inserts his smart card to login a terminal
out that there are some weaknesses in Chien et al’s scheme[2] device, and then enters his identity ID and password PW.
and proposed an improved scheme. The following computations are then performed.
In this article, we show that there still exist weaknesses in 1) Smart card computes c1 = R⊕h(b⊕PW); c2 = h(c1 ⊕T 1 ),
Ku et al’s scheme. The remainder of this article is presented where T 1 denotes the U’s current time stamp.
as follows. In section II, we will briefly review Ku et al’s 2) U then sends message (ID, T 1 , c2 ) to AS through an
scheme. In section III, we will analyze the security of Ku insecure channel.
et al’s scheme, and present four attack mechanisms on the
scheme. C. Verification Phase
This phase is invoked whenever AS receives U’s login
II. Ku'S SCHEME
Ku’ S request. Upon receiving the authentication request message
The security of Ku’s scheme is based on the one-way (ID, T 1 , c2 ) from U, AS and U’s smart card execute the
function. There are three phases in Ku’s scheme: registration following jobs to facilitate the mutual authentication between
phase, login phase, verification phase. Let U denotes the the U and AS .

133
1) AS validates ID and verifies the time interval between B. Guessing Password Attack
T 1 and T 2 ,where T 2 is the time stamp when the request In general, the tamper resistance of smart cards is widely
message is receive. If the format of ID is not correct or assumed in most smart card based schemes. However, such
(T 2 − T 1 ) ≥ △T , where △T denotes the expected valid an assumption may be problematic in practice. In 2002,
time interval for transmission delay, then the AS rejects Messerges et al[6] showed that the secrets stored in a smart
the login request. card may be breached by analyzing the leaked information.
2) AS computes h(h(ID ⊕ x) ⊕ T 3 ). If the computed result Once the adversary has obtained the R and b stored in U’s
equals the received c2 , AS accepts U’s login request smart card, he can perform a guessing password attack[3]
and then computes c3 = h((h(ID ⊕ x) ⊕ x ⊕ T 3 ), where to obtain PW. In the following, we will show that Ku’s
T 3 denotes AS ’s current time stamp. authentication is vulnerable to the password guessing attacks.
3) AS sends (T 3 , c3 ) back to U via a insecure channel. The password guessing attacks are performed by means of
4) Once receiving the message from AS , U verifies the known-plaintext attacks or verifiable-text attacks. Now, let’s
validity of T 3 at first. If (T 4 − T 3 ) ≤ △T , where T 4 consider two cases, the off-line and the on-line password
is the time stamp for received responding message guessing attacks on the Ku’s scheme.
and △T denotes the expected valid time interval for
transmission delay, U will believes that the responding 1) Off-line password guessing attack
part is an authenticity AS . Then U computes h(c1 ⊕ T 3 ) Suppose that the adversary also has intercepted the
and compares the result to the received c3 . If equals, U messages (ID, T 1 , c2 ) during one of U’s past logins.
successfully authenticates AS , the mutual authentication With the knowledge of R and T 1 , the intruder can
is done, otherwise, U stops the connection. randomly guess a password PW ∗ and then compute
c∗1 = R⊕h(b⊕PW ∗ ); c∗2 = h(c∗1 ⊕T 1 ). If c∗2 = c2 , it means
PW ∗ is U’s password, then the intruder can successful
III. CRYPTANALYSIS OF Ku'S
C  Ku’ SCHEME
S impersonate the legal U with the guessed password PW ∗
to login AS .
In this section, four attack mechanisms will be introduced. 2) On-line password guessing attack
There are Hsu’s parallel session attack[3], password guessing Consider the scenario of the on-line password guessing
attacks[4], changing time stamp attack[7] and another new attack that an intruder attempts to guess a password of
attack[5]. an intended user and creates a bogus login message until
the bogus message is accepted by the server AS . If the
A. Parallel Session Attack intruder plots this attack successfully, it means that he
can impersonate the intended user and login AS . Ku’s
The parallel session attack is also named as Hsu et al’s scheme is also vulnerable to such an attack since the
attack. In [3], Hsu et al’s proposed a new way to masquerade intruder can guess U’s password PW ∗ and create a bogus
as other legal user without knowing user’s passwords by login message (ID, T 1 , c2 ). If (ID, T 1 , c2 ) is accepted by
intercepting and dropping useful message. Considering that AS , then the intruder successfully impersonates user U
an intruder Ua without knowing user’s passwords wants to to login AS and U’s password is guessed.
masquerade as a legal user U I by eavesdropping communica-
tion between AS and U I . Ua is able to perform the following C. Changing Time Stamp Attack
steps. Changing time stamp attack[7] is a method for an intruder
1) When U I wants to login the authentication server AS , eavesdrops communication between U and AS , and adapts
U I sends the login message (IDi , T 1 , c2 ) to AS , where his clock to go beyond the valid user’s origin time stamp
T 1 is the current time stamp. If (IDi , T 1 , c2 ) is valid, the T . Suppose T ′ is the time that the destination receives the
identification of U I is authenticated and AS responses message, T a denotes the intruder’s current time stamp, △T
U I with (T 3 , c3 ), where T 3 is the current time stamp. If denotes the expected valid time interval for transmission delay.
Ua wants to masquerade as a legal user U I , he intercept He chooses T a and sends the message to destination. If
this message. (T ′ − T a ) ≤ △T , he can successful be authenticated. There are
2) Ua then masquerades as the legal user to start a new two modes of changing-time-stamp attacks in Ku’s scheme.
session with AS by sending (IDi , T 3 , c∗2 ) back to AS , 1) Mode one Suppose that an intruder has known c1
where c∗2 = c3 . during one of U’s past logins. With the knowledge of
3) The login message (IDi , T 3 , c∗2 ) will pass the authentica- c1 , the intruder intercepts the message (ID, T 1 , c2 ) and
tion of Ku’s scheme due to the fact that adapts his clock to go beyond the valid user U. He
c∗2 = c3 = h(h(EIDi ⊕ x) ⊕ T 3 ). So AS accepts Ua ’s chooses T 1a and computers c2a = h(c1 ⊕ T 1a ), then sends
request. the message (ID, T 1a , c2a ) back to AS . Where T 1a is the
4) Finally, AS responses Ua with the message (T 4 , c∗3 ), intruder’s current time stamp, T ′ is the time stamp that
where c∗3 = h(c1 ⊕ T 3 ) and T 4 is the current time stamp. AS receives the message, △T denotes the expected valid
The intruder Ua intercepts and drops this message. time interval for transmission delay, and (T ′ −T 1a ) ≤ △T .

134
Thus the intruder can successfully masquerade as a legal 1) Guessing password attack is untanable because initial
user U to login AS . sensitivity of chaotic map results in mass amounts of
2) Mode two Suppose that an intruder has known c1 at computation.
one time of U’s past logins. In authentication phase, after 2) The AS also needs the hyper-complex chaotic map to
AS has accepted U’s login request, and sends message compute sc(ci , T j ), thus changing time stamp attack will
(T 3 , c3 ) to U, the intruder intercepts the message, and responds very different time gap, and exceed beyond
adapts his clock to go beyond the valid AS . The intruder valid time interval △T .
chooses T 3a and computes c∗3a = h(c1 ⊕ T 3a ). Then the 3) The scrambled chaotic map is not only hyper-
intruder impersonates the AS and sends the message complexity, but also invertible[9]. However, if it is
(T 3a , c∗3a ) to U. Where T 3a is the intruder’s current time combined with Hash function, it is not yet invertible
stamp, T ′ is the time that U receives the message, △T at all. So the new attack is not exist.
denotes the expected valid time interval for transmission 4) Parallel session attack do not achieved by some ex-
delay, and (T ′ −T 3a ) ≤ △T . The valid user U receives the tend. Even if the intercepter can get the login message
message and regards the intrude as a legal authentication (IDi , T 3 , c∗2 ) from AS , it cannot check the correction of
system. Such a weakness may result in serious in E- c3 , because he does not get signal c1 by computing
commerce systems. hyper-complex function sc(.), and finally the interceptor
stop his connection to AS .
D. A New Attack Thus we can efficiently enhance the remote user authentication
In Ku’s scheme, c1 is one of the most important parameters. scheme, and improve security of Ku’s scheme.
Suppose c1 is obtained, the adversary can use it to impersonate V. CONCLUSION
C
legal user U to login AS . There are two modes for the
adversary to obtain c1 . In this paper, we analyzed the security of Ku’s remote user
authentication scheme. We find it still cannot withstand against
First, suppose AS ’s secret key x has been stolen or the
the parallel session attack, and also be vulnerable to the off-
secret key x is revealed by some accident. When the message
line and on-line password guessing attacks. Furthermore, we
(ID, T 1 , c2 ) is intercepted, one can get by computing c1 =
also point out that Ku’s scheme is vulnerable to a new attack
R ⊕ h(b ⊕ PW) = h(EID ⊕ x).
and cannot resist changing time stamp attack. We improve Ku’s
Second, if some one intercepted another message
scheme by instead of computation h(ci ⊕ T j ) in all the phases
(ID, T 1 , c2 ), he can get c1 by guessing. The adversary ran-
of remote authentication with a hyper-complex chaotic map
domly guesses c∗1 , and then computes c∗2 = h(c∗1 ⊕ T 1 ). If
sc(ci , T j ). The hyper-complex chaotic hash system is more
c∗2 = c2 , he knows that he gets the proper c1 .
resistance to the attacks. We can conclude that the improved
scheme is more security than before.
IV. HYPER-COMPLEX CHAOTIC
H-C C HASH
H SYSTME
S
REFERENCES
R
Herein, we have shown that Ku’s scheme still do not achieve
the security requirement. As we further research the process [1] Wei-chi Ku and Shui-min Chen. Weaknesses and Improvements of an
Efficient Password Dased Remote User Authentication Scheme Using
of the remote authentication, we evidently know that all the Smart Cards, IEEE Trans. on Consumer Electronics,Vol.50(1), February
attacks be happened in insecure channel on phases of login 2004, pp:204-206
and verification, where, the identifying or hash function in [2] H.Y.Chien,J.K.Jan,and Y.M.Tsing, An Efficient and Practical Solution to
Remote Authentication: Smart Cards, Computers and Security, Vol.21(4),
Ku’s scheme or Chien et al’s scheme is simple enough, thus 2002, PP.372-375
the intruder can impersonate an illegal user easily intercepts [3] Chien-Lung Hsu, Security of Two Remote User Authentication Schemes
the message from authentication server, or attacks on AS Using Smart Cards, IEEE Trans. on Consumer Electronics, Vol.49(4),
November 2003, pp.1196-1198
by simply computation or short time enough of computation [4] M.Lomas, L.Gong, J,Saltzer, and R.Needham, Reducing Risks from
with Hash function h(ci ⊕ T j ) in Ku’s scheme or Chien et Poorly Chosen Keys, ACM Operating System Review, Vol.23(5), 1989,
al’s scheme. Here we suggest a Chaotic Hash authentication pp.14-18
[5] Amit K.Awasthi and Sunder lal, A Remote User Authentication Scheme
scheme. It done by instead of Hash function h(ci ⊕ T j ) with Using Smart Cards with Forward Secrecy, IEEE Trans. on Consumer
hyper-complex system, called scrambled chaotic map[8] in Electronics, Vol.49(4), November 2003, pp.1246-1248
Ku’s scheme or Chien et al’s scheme. Because chaotic map [6] T.S.Messerges, E.A.Dabbish, and R.H.Sloan, Examining Smart Card
Security under the Threat of Power Analysis Attacks, IEEE Trans.on
is very sensitive to its initial values or keys, its computation Computers, Vol.51, May 2002, pp.541-552
complexity goes beyond 10+30 on finite precision of 32 bits[9], [7] Li Li, Zhang Huang-guo. Analyzing the Attacks Types on Cryptographic
thus it is strong collision resistance, that is to say it almost Protocol. Computer Engineering and Application, Vol.171,2004, PP.16-19
[8] Zhu Canyan, Zhang Lihua, Wang Yiming, et. al. Periodic Performance
predictively fail to be attacked by guessing or directly compu- of the Chaotic Spread Spectrum Sequence on Finite Precision. Journal
tation. Let the scrambled chaotic map be denoted by function of Systems Engineering & Electronics, to be published.
sc(.), that is to do alternate c2 = h(c1 ⊕T 1 ) with c2 = sc(c1 , T 1 ) [9] Zheng Yufan, Chen Guanrong, Zhu Canyan. A System Inversion Ap-
proach to Chaos-Based Digital Secure Speech Communication. Interna-
in login phase, do alternate c3 = h(c1 ⊕ T 3 ) with c3 = h(c1 , T 3 ) tional Journal of Bifurcation & Chaos, Vol.15, Aug. 2005, pp.2569-2582.
in verification phase in Ku’s scheme. All attacks mentioned
above will be defensive.

135

You might also like