160 likes | 350 Vues
A Secure Remote User Authentication Scheme with Smart Cards. Manoj Kumar http://eprint.iacr.org/2008/331,2008 報告者 : 許睿 中 日期 :11.23. Outline. Introduction Notations Scheme Conclusions. Introduction. Register phase. USER. SERVER. Login phase. SERVER. USER. Authentication phase.
E N D
A Secure Remote User Authentication Scheme with Smart Cards ManojKumar http://eprint.iacr.org/2008/331,2008 報告者:許睿中 日期:11.23
Outline • Introduction • Notations • Scheme • Conclusions
Introduction Register phase USER SERVER Login phase SERVER USER Authentication phase
Introduction • The point of vulnerabilities in a remote user authentication scheme: • Security vulnerabilities due to remote user • Security vulnerabilities due to remote server • Security vulnerabilities due to insecure channel • To solve these vulnerabilities: • mutual authentication • Secure session key generation
Outline • Introduction • Notations • Scheme • Conclusions
Outline • Introduction • Notations • Schema • Conclusions
Scheme • The Register phase • The Login phase • The Verification phase • The Password change phase
The Login phase U S
Outline • Introduction • Notations • Scheme • Conclusions
Conclusions • This scheme not only provides mutual authentication between the user and server , but also establishes a common session key to provide message confidentiality. • In the password change phase of the propose protocol , each user can change his password without connect to any server.