Table 1: Comparison of computational cost.
Phase Lee et al.’s scheme Our scheme
Reg. 3T
H
3T
H
Login 3T
H
+ 2T
XOR
4T
H
+ 2T
XOR
Auth. 2T
H
+ 2T
XOR
3T
H
+ 2T
XOR
Hence, any forged login request will be rejected in
steps 2 and 3 of authentication phase, where server
tries to compute B
∗
i
= C
2
⊕ h(A
i
k T
a
) and C
∗
1
=
h(T
a
⊕ B
∗
i
) and compare C
∗
1
with received C
1
.
5.2 Computation Cost Analysis
We here evaluate the computation cost of the im-
proved scheme and make comparison with the Lee
et al.’s scheme.
All phases of proposed protocol only require lim-
ited number of hash computations, exclusive-or op-
erations, and some other low-cost operations such as
string concatenations. The hash operations can be
performed efficiently and computation cost of other
operations is extremely low, so the efficiency of user
and server are guaranteed in the proposed protocol.
You can compare the computational cost of three
phases of our scheme with Lee et al.’s scheme in Ta-
ble 1, where T
H
means execution time of one-way
hash function h(.), and T
XOR
means execution time
of exclusive-or operation ⊕. You can see that in both
login and authentication phases, our scheme adds just
one more T
H
to their scheme, so it does not incur
much more computational cost to provide protection
against forgery attack. In other words, an additional
hash computation may be the simplest way to prevent
from forgery attack, as our scheme does.
6 CONCLUSION
In this paper, we showed that Lee et al.’s authentica-
tion scheme, which was proposed to solve the forgery
attack of the Wu and Chieu’s scheme, is still vulnera-
ble to the forgery attack. So Lee et al.’s authentication
scheme is insecure.
Finally, we proposed an improved scheme with
very low additional computational cost that not only
can achieve all the advantages of Lee et al.’s scheme
but also can withstand against the forgery attack.
REFERENCES
Lin, C-L. and Hwang, T. (2003). A password authentication
scheme with secure password updating. Computers
and Security, Vol. 22, Issue 1, pp. 68–72.
Lamport, L. (1981). Password authentication with insecure
communication. Communications of ACM, Vol. 24,
pp. 770–772.
Hwang, M-S. and Li, L-H. (2000). A new remote user au-
thentication scheme using smart cards. IEEE Trans-
actions on Consumer Electronics, Vol. 46, Issue 1,
pp. 28–30.
Sun, H-M. (2000). An efficient remote use authentication
scheme using smart cards. IEEE Transactions on Con-
sumer Electronics, Vol. 46, Issue 4, pp. 958–961.
Wu, S-T. and Chieu, B-C. (2003). A user friendly remote
authentication scheme with smart cards. Computers
and Security, Vol. 22, Issue 6, pp. 547–550.
Fan, C-I. and Chan, Y-C. and Zhang, Z-K. (2005). Robust
remote authentication scheme with smart cards. Com-
puters and Security, Vol. 24, Issue 8, pp. 619–628.
Yang, C-C. and Wang, R-C. (2004). Cryptanalysis of a
user friendly remote authentication scheme with smart
cards. Computers and Secu rity, Vol. 23, Issue 5,
pp. 425–427.
Hwang, M-S. and Lo, J-W. and Liu, C-Y. and Lin, S-C.
(2005). Cryptanalysis of a user friendly remote au-
thentication scheme with smart card. Journal of Ap-
plied Sciences, Vol. 5, Issue 1, pp. 99–100.
Hwang, K-F. and Liao, I-E. (2005). Two attacks on a
user friendly remote authentication scheme with smart
cards. ACM SIGOPS Operating Systems Review,
Vol. 39, Issue 2, pp. 94–96.
Lee, C-Y. and Lin, C-H. and Chang, C-C. (2005). An
improved low computation cost user authentication
scheme for mobile communication. Proceedings of
19th International Conference on Advanced Informa-
tion Networking and Applications (AINA’05), IEEE
Computer Society, Vol. 2, pp. 249–252.
SECRYPT 2006 - INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY
8