Abstract
In the multi-server authentication (MSA) paradigm, a subscriber might avail multiple services of different service providers, after registering from registration authority. In this approach, the user has to remember only a single password for all service providers, and servers are relieved of individualized registrations. Many MSA-related schemes have been presented so far, however with several drawbacks. In this connection, recently Li et al. in Wirel. Pers. Commun., (2016). doi:10.1007/s11277-016-3293-x presented a chaotic map-based multi-server authentication scheme. However, we observed that Li et al. suffer from malicious server insider attack, stolen smart card attack, and session-specific temporary information attack. This research work is based on improving security of Li et al.’s protocol in minimum possible computation cost. We also evaluate the security for the contributed work which is provable under formal security analysis employing random oracle model and BAN Logic.
Similar content being viewed by others
References
Kocarev, L.: Chaos-based cryptography: a brief overview. IEEE Circuits Syst. Mag. 1(3), 6–21 (2001)
Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)
Lee, Y.S.; Kim, E.; Seok, S.J.; Jung, M.S.: A smart card-based user authentication scheme to ensure the PFS in multi-server environments. IEICE Trans. Commun. E95(B2), 619–622 (2012)
He, D.B.; Hu, H.: Cryptanalysis of a smart card-based user authentication scheme for multi-server environments. IEICE Trans. Commun. E95(B9), 3052–3054 (2012)
Chaudhry, S.A.: A secure biometric based multi-server authentication scheme for social multimedia networks. Multimed. Tools Appl. 75(20), 12705–12725 (2016)
He, D. B. : Security flaws in a biometrics-based multi-server authentication with key agreement scheme. IACR Cryptology ePrint Archive, 2011/365 (2011)
Irshad, A.; Sher, M.; Rehman, E.; Ch, S.A.; Hassan, M.U.; Ghani, A.: A single round-trip SIP authentication scheme for voice over internet protocol using smart card. Multimed. Tools Appl. 74(11), 3967–3984 (2015)
Irshad, A.; Sher, M.; Faisal, M.S.; Ghani, A.; Ul Hassan, M.; Ashraf Ch, S.: A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme. Secur. Commun. Netw. 7(8), 1210–1218 (2014)
Li, L.H.; Lin, I.C.; Hwang, M.S.: A remote password authentication scheme for multi-server architecture using neural networks. IEEE Trans. Neural Netw. 12(6), 1498–1504 (2001)
Lin, I.C.; Hwang, M.S.; Li, L.H.: A new remote user authentication scheme for multi-server architecture. Future Gener. Comput. Syst. 19(1), 13–22 (2003)
Juang, W.S.: Efficient multi-server password authenticated key agreement using smart cards. IEEE Trans. Consum. Electron. 50(1), 251–255 (2004)
Chang, C. C.; Lee, J. S.: An efficient and secure multi-server password authentication scheme using smart cards. In: Proceedings of the third international conference on cyberworlds, pp. 417–422 (2004)
Tsaur, W.J.; Wu, C.C.; Lee, W.B.: A smart card-based remote scheme for password authentication in multi-server Internet services. Comput. Stand. Interfaces 27(1), 39–51 (2004)
Tsaur, W.J.; Wu, C.C.; Lee, W.B.: An enhanced user authentication scheme for multi-server Internet services. Appl. Math. Comput. 170(1), 258–266 (2005)
Tsai, J.L.: Efficient multi-server authentication scheme based on one-way hash function without verification table. Comput. Secur. 27(3–4), 115–121 (2008)
Irshad, A.; Sher, M.; Chaudhry, S. A.; Xie, Q.; Kumari, S.; Wu, F.: An improved and secure chaotic map based authenticated key agreement in multi-server architecture. Multimed Tools Appl., 1–38 (2017)
Irshad, A.; Sher, M.; Ahmad, H.F.; Alzahrani, B.A.; Chaudhry, S.A.; Kumar, R.: An improved multi-server authentication scheme for distributed mobile cloud computing services. KSII Trans. Internet Inf. Syst. (TIIS) 10(12), 5529–5552 (2016)
Liao, Y.P.; Wang, S.S.: A secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces 31(1), 24–29 (2009)
Hsiang, H.C.; Shih, W.K.: Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces 31(6), 1118–1123 (2009)
Sood, S.K.; Sarje, A.K.; Singh, K.: A secure dynamic identity based authentication protocol for multi-server architecture. J. Netw. Comput. Appl. 34(2), 609–618 (2011)
Lee, C.C.; Lin, T.H.; Chang, R.X.: A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards. Expert Syst. Appl. 38(11), 13863–13870 (2011)
Li, X.; Xiong, Y.P.; Ma, J.; Wang, W.D.: An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. J. Netw. Comput. Appl. 35(2), 763–769 (2012)
Li, X.; Ma, J.; Wang, W.D.; Xiong, Y.P.; Zhang, J.S.: A novel smart card and dynamic ID based remote user authentication scheme for multi-server environment. Math. Comput. Model. 58(1–2), 85–95 (2013)
Li, C.T.; Lee, C.C.; Weng, C.Y.: An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments. Nonlinear Dyn. 74(4), 1133–1143 (2013)
Lee, C.C.; Chen, C.L.; Wu, C.Y.; Huang, S.Y.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2), 79–87 (2012)
He, D.B.; Chen, Y.T.; Chen, J.H.: Cryptanalysis and improvement of an extended chaoticmaps-based key agreement protocol. Nonlinear Dyn. 69(3), 1149–1157 (2012)
Lai, H.; Xiao, J.; Li, L.; et al.: Applying semigroup property of enhanced chebyshev polynomials to anonymous authentication protocol. Math. Probl. Eng. (2012). doi:10.1155/2012/454823
Zhao, F.J.; Gong, P.; Li, S.; Li, M.G.; Li, P.: Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials. Nonlinear Dyn. 74(1–2), 419–427 (2013)
Xie, Q.; Zhao, J.M.; Yu, X.Y.: Chaotic maps-based three-party password-authenticated key agreement scheme. Nonlinear Dyn. 74(4), 1021–1027 (2013)
Kocher, P.; Jaffe, J.; Jun, B.: Differential power analysis. In: Proceedings of advances in cryptology (Crypto’99), pp. 388–397 (1999)
Irshad, A.; Sher, M.; Chaudhary, S.A.; Naqvi, H.; Farash, M.S.: An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging registration centre. J. Supercomput. 72(4), 1623–1644 (2016)
Lee, C.C.; Lou, D.C.; Li, C.T.; Hsu, C.W.: An extended chaotic-maps-based protocol with key agreement for multi-server environments. Nonlinear Dyn. 76(1), 853–866 (2014)
Li, X.; Niu, J.; Kumari, S.; Islam, S.H.; Wu, F.; Khan, M.K.; Das, A.K.: A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security. Wirel. Pers. Commun. (2016). doi:10.1007/s11277-016-3293-x
Li, X.; Niu, J.W.; Khan, M.K.; Liao, J.G.: An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36(5), 1365–C1371 (2013)
Wang, X.; Zhang, W.; Guo, W.; Zhang, J.: Secure chaotic system with application to chaotic ciphers. Inf. Sci. 221, 555–570 (2013)
Cheong, K.Y.; Koshiba, T.: More on security of public key cryptosystems based on Chebyshev polynomials. IEEE T Circuits II 54(9), 795–799 (2007)
Jiang, Q.; Ma, J.; Lu, X.; Tian, Y.: Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2), 12 (2014)
Jiang, Q.; Wei, F.; Fu, S.; Ma, J.; Li, G.; Alelaiwi, A.: Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dyn. 83(4), 2085–2101 (2016)
Ch, S.A.; Sher, M.; Ghani, A.; Naqvi, H.; Irshad, A.: An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Multimed. Tools Appl. 74(5), 1711–1723 (2015)
Xiao, D.; Liao, X.; Wong, K.: An efficient entire chaos based scheme for deniable authentication. Chaos Solitons Fractals 23, 1327–1331 (2005)
Lumini, A.; Loris, N.: An improved Bio-hashing for human authentication. Pattern Recognit. 40(3), 1057–1065 (2007)
Jin, A.T.B.; Ling, D.N.C.; Goh, A.: Bio-hashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognit. 37(11), 2245–2255 (2004)
Messerges, T.S.; Dabbish, E.A.; Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541–552 (2002)
Li, C.T.; Lee, C.C.; Weng, C.Y.; Fan, C.I.: A secure dynamic identity based authentication protocol with smart cards for multi-server architecture. J. Inf. Sci. Eng. 31(6), 1975–1992 (2015)
Chen, C.T.; Lee, C.C.: A two-factor authentication scheme with anonymity for multi-server environments. Secur. Commun. Netw. 8(8), 1608–1625 (2015)
Li, X.; Niu, J.; Kumari, S.; Wu, F.; Choo, K.K.R.: A robust biometrics based three-factor authentication scheme for global mobility networks in smart city. Future Gener. Comput. Syst. (2017). doi:10.1016/j.future.2017.04.012
Li, X.; Ibrahim, M.H.; Kumari, S.; Sangaiah, A.K.; Gupta, V.; Choo, K.K.R.: Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput. Netw. (2017). doi:10.1016/j.comnet.2017.03.013
Burrow, M.; Abadi, M.; Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8, 18–36 (1990)
Irshad, A.; Ashraf Chaudhry, S.: Comments on A privacy preserving three-factor authentication protocol for e-health clouds. J. Supercomput. 73, 1504 (2017)
Tsaur, W.J.; Li, J.H.; Lee, W.B.: An efficient and secure multi-server authentication scheme with key agreement. J. Syst. Softw. 85(4), 876–882 (2012)
He, D.B.; Wang, D.: Robust biometrics-based authentication scheme for multi-server environment. IEEE Syst. J. 9(3), 816–823 (2015)
Tsai, J.L.; Lo, N.W.: A chaotic map-based anonymous multi-server authenticated key agreement protocol using smart card. Int. J. Commun. Syst. 28(13), 1955–1963 (2015)
Lu, Y.; Li, L.; Peng, H.; Yang, Y.: Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multi-server architecture. Secur. Commun. Netw. (2016). doi:10.1002/sec.1417
Acknowledgements
This work was supported by the National Natural Science Foundation of China under Grant No. 61300220, and the Scientific Research Fund of Hunan Provincial Education Department under Grant No. 16B089.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Irshad, A., Chaudhry, S.A., Xie, Q. et al. An Enhanced and Provably Secure Chaotic Map-Based Authenticated Key Agreement in Multi-Server Architecture. Arab J Sci Eng 43, 811–828 (2018). https://doi.org/10.1007/s13369-017-2764-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13369-017-2764-z