180 likes | 311 Vues
A Secure Smart-Card Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems. Authors: Tian -Fu Lee·Chuan-Ming Liu Speaker: 陳彥賓. Outline. 1. Introduction 2. Review Of Zhu’s Scheme 3. Weakness Of Zhu’s Scheme 4. Improved Scheme 5. Security Analysis
E N D
A Secure Smart-Card Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems Authors: Tian-Fu Lee·Chuan-MingLiu Speaker: 陳彥賓
Outline • 1. Introduction • 2. Review Of Zhu’s Scheme • 3. Weakness Of Zhu’s Scheme • 4. Improved Scheme • 5. Security Analysis • 6. Conclusion
1. Introduction • A smart-card based authentication scheme for telecare medicine information systems enables patients,doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks.
2. Review Of Zhu’s Scheme(2/5) • Initial 1.Generates two large primes p、q n=p×q 2.choose the system public /private key pair (e,d). User Ui Server S
2. Review Of Zhu’s Scheme(3/5) • Registration User Ui Server S 1.Generates 、 、 2. Store () into smart card Secure Channel smart card 3. inserts to smart card Secure Channel
2. Review Of Zhu’s Scheme(4/5) • Authentication Server S User Ui 1.Insert his smart card Input Generate Compute 2.Check Compute Check Generate Compute Check Compute Check If true,accept the service request.
2. Review Of Zhu’s Scheme (5/5) • Password change Insert his smart card Input old password new password Smart card Compute Smart card replaces with
3. Weakness Of Zhu’s Scheme (1/2) • The faults of the authentication Server S User Ui • Registration S uses compute • Authentication Uiuses compute • Password change Uiuses and )
3. Weakness Of Zhu’s Scheme (2/2) • The parallel attacks Server S Attacker User Ui 1.Insert his smart card Input Generate Compute 2.Check Compute Check Generate Compute 3.Check Compute 4.Check Accept the service request
4. Improved Scheme (1/4) • Initial 1.Generates two large primes p、q n=p×q 2.choose the system public /private key pair (e,d). Server S User Ui
4. Improved Scheme (2/4) • Registration Server S User Ui 、 1.Generates 、 2. Store () into smart card Secure Channel smart card Secure Channel 3. inserts and SNi=0 to smart card
4. Improved Scheme (3/4) • Authentication Server S User Ui 1.Insert his smart card Input Generate ++ 2. Check and Generate Updates as Compute Check If true,accept the service request.
4. Improved Scheme (4/4) • Password change Insert his smart card Input old password new password Smart card Compute Smart card replaces with
5. Security Analysis (1/3) • The parallel session attacks Uses SNiauthentication server and users can easilydetect the replaying andmanipulating used messagesby attackers.
5. Security Analysis (2/3) • Providing users’ anonymity Server S User Ui 1.Insert his smart card Input Generate ++
5. Security Analysis (3/3) • Session key security A public key pair (e, n), d cannot be calculated since no polynomial algorithm has been identified for solving RSA. Thus, obtaining from is difficult.
6. Conclusion • This paper has a lower computational cost and provides more security properties and using a serial number improve replay attack.