Abstract
In 2011, Debiao et al. proposed an ID-based remote mutual authentication with key agreement scheme on ECC for mobile client-server environment [H. Debiao, C. Jianhua, H. Jin: An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security, Information Fusion, 2011]. They claimed their scheme provides remote mutual authentication with key agreement and is secured against various known attacks. In this paper, we show that their proposed scheme has some other security flaws.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
ElGamal, T.: A public key cryptosystem and a signature protocol based on discrete logarithms. IEEE Trans. on Info. 31, 469–472 (1985)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Comm. of the ACM 21(2), 120–126 (1978)
Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)
Koblitz, N.: Elliptic curve cryptosystem. J. of Math. of Comp. 48(177), 203–209 (1987)
Das, M.L., Saxena, A., Gulati, V.P., Phatak, D.B.: A novel remote client authentication protocol using bilinear pairings. Comp. & Secu. 25(3), 184–189 (2006)
Das, M.L., Saxena, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE Trans. on Cons. Elec. 50(2), 629–631 (2004)
Chou, J.S., Chen, Y., Lin, J.Y.: Improvement of Das et al.’s remote user authentication scheme (2005), http://eprint.iacr.org/2005/450.pdf
Goriparthi, T., Das, M.L., Saxena, A.: An improved bilinear pairing based remote user authentication scheme. Comp. Stan. & Inte. 31, 181–185 (2009)
Tseng, Y.M., Wu, T.Y., Wu, J.D.: A pairing-based client authentication protocol for wireless clients with smart cards. Informatica 19(2), 285–302 (2008)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Wang, Y.Y., Kiu, J.Y., Xiao, F.X., Dan, J.: A more efficient and secure dynamic ID-based remote user authentication scheme. Comp. Comm. 32, 583–585 (2009)
Khan, M.K.: Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’. Comp. Comm. 34(3), 305–309 (2011)
Yang, J.H., Chang, C.C.: An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comp. & Secu. 28(3), 138–143 (2011)
Yoon, E., Yoo, K.: Robust ID-based remote mutual authentication with key agreement protocol for mobile devices on ECC. In: 2009 International Conference on Computational Science and Engineering, Vancouver, Canada, pp. 633–640 (2009)
Chen, T.H., Chen, Y.C., Shih, W.K.: An Advanced ECC ID-Based remote mutual authentication scheme for mobile devices. In: Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, pp. 116–120 (2010)
Debiao, H., Jianhua, C., Jin, H.: An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security. Info. Fusi (2011), doi:10.1016/j.inffus.2011.01.001
Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453–472. Springer, Heidelberg (2001)
Cheng, Z., Nistazakis, M., Comley, R., Vasiu, L.: On the indistinguishability-based security model of key agreement protocols-simple cases. Cryptology ePrint Archive, Report 2005/129 (2005)
Gong, L.: A security risk of depending on synchronized clocks. ACM SIGOPS Operating System Review 26(1), 49–53 (1992)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hafizul Islam, S.K., Biswas, G.P. (2011). Comments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server Environment. In: Abraham, A., Lloret Mauri, J., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 191. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22714-1_65
Download citation
DOI: https://doi.org/10.1007/978-3-642-22714-1_65
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22713-4
Online ISBN: 978-3-642-22714-1
eBook Packages: Computer ScienceComputer Science (R0)