Authors: Hongfeng Zhu
Publish Date: 2015/07/19
Volume: 85, Issue: 4, Pages: 2141-2156
Abstract
In a client–server environment it is an important issue to ensure that only legal users have access to use the various remote services Nowadays many chaotic mapsbased authenticated key agreement schemes using static ID have been widely used However static ID authentication schemes cannot provide user anonymity It is a better choice to utilize dynamic ID authentication scheme Recently Lin proposed a chaotic mapsbased mobile dynamic ID authenticated key agreement scheme and proved that it is secure against existential active attacks Unfortunately in this paper we show that Lin’s scheme cannot resist dictionary attack user spoofing attack and denial of service DoS attack In addition in the passwordchange phase of Lin’s scheme if anyone else inputs the two uncorrelated passwords the mobile device will continue to update the password which lead to legal user cannot log in forever Finally we proposed an improved protocol based on chaotic maps Compared with previous related works the improved protocol not only can withstand existential active attacks but also has better computational efficiencyServer B uses the secret key s to compute K SA = T s T k x so the improved scheme allows B authenticated Alice by checking whether H Aprime = H A Because only Alice’s MD can compute the H a = hsID a by inputting the right ID a and PW a The maninthemiddle attack is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them making them believe that they are talking directly to each other over a private connection when in fact the entire conversation is controlled by the attacker
Keywords: