Page 82 - 2023-Vol19-Issue2
P. 82

78 |                                                                                                                                            Hamed & Yassin

       VCU' i and then computes ECertUi = EncSKU' i (CertUi ) and                                         •  CdIDeHcA'rSUykipictshinseguckcrcsi' eI=sDsDUfuiel=c,?SCIKDHUiA'S(UEkiU;reii)fs.ttohreevserraifnicdaotmionnuofmIbDeUri  =?
       sends (ECertUi ,CHU i) to CHSk as a second factor.                                                                                                                                                                           by

     • CHSk computes CHU' i = H(CertUi ? VCUi ) and com-                                                  • CHSk computes PWA''Ui = H(H(PWUi ) ? ri') and com-
       pares CHU i =? CHU' i. If so, a user is authenticated at the                                         pares E(H(Ui)) =? gPWA'Ui hri' modN. If so, CHSk gener-
       same time. Then, CHSk computes SKUi = SKUi ?VCUi
       and decrypts CertU' i = DecSKU''i (ECertUi ). Therefore, our                                         ates and encrypts verification code (VCUi )EU i = EncSKUi
       proposed scheme achieves mutual authentication be-                                                   (VCUi ) and generates QRU i that contains the encrypted
                                                                                                            verification code (VCUi ). Then, CHSk sends QRU i to
       tween the two entities (Ui,CHSK). Otherwise, it rejects                                              Ui.
       the current phase.

     Proposition 2. Our proposed scheme can support user                                                      As a result, the primitive parameters of (IDA' Ui , EH(Ui), EUi )
                                                                                                          generate once, and CHSk cannot link many logins with the
anonymity.                                                                                                same Ui. Therefore, the proposed scheme can provide unlink-
                                                                                                          ability.
     Proof. If an attacker tries to eavesdrop on the user’s

login request, he cannot obtain the user’s identity from the

crypto hash function since it is embedded with ri, which is                                               Proposition 5. Our proposed scheme is resistant to replay

not identified to the attacker. Additionally, ri generates once                                           attacks.

for each user’s login request. In the login and authentication                                            Proof. In a replay attack, an adversary intercepts the
phase, Ui sends (ID'AUi , EH(Ui), EUi ) to CHSK. Thus, it has
been encrypted by shared key SKUi that was known by Ui and                                                login message delivered by a legitimate user to the CHSk and
                                                                                                          replays it back to the attacker. Then, the adversary reuses
CHSK. Therefore, it is difficult for an attacker to reveal the
                                                                                                          this message to impersonate the user when logging into the
user’s identity, and he cannot restore the shared key that is

generated once for each user’s login request. This indicates                                              system in the next session. In our proposed scheme, each
                                                                                                          new login request should be identical to CHSk' s parameters
that our proposed scheme can support user anonymity.                                                      (ID'AUi , EH(Ui), EUi , ECertUi ,CHU i), and he will be unable to
                                                                                                          use these parameters again for logging into the system, as
     Proposition 3. Our proposed scheme can ensure forward

secrecy.

    Proof. The popular session key relies on SKUi used in                                                 these parameters are generated once based on ri for each
the login and authentication phase. Our proposed scheme                                                   user’s login request and he will be unable to get ri. Therefore,
                                                                                                          an adversary cannot pass any replayed message to the CHSk
protects the password even when the shared key SKUi is dis-                                               verification. Moreover, our approach can resist this attack
closed or leaked. If the shared key SKUi is revealed by the
adversary, the authentication of the system is not impressed                                              without synchronization clocks. Therefore, an adversary will

to affection of attackers’ behaviors, and he cannot use this                                              fail to apply this type of attack .

key in the next login phase since the shared key is generated                                             Proposition 6. Our proposed scheme can resist MITM

once based on VCUi . Furthermore, it is extremely difficult                                               attacks.
for an adversary to derive PWA'Ui and random number ri, as
well as the attribute of the crypto one-way hash function                                                 Proof. An MITM attack intercepts a conversation be-

                                                                                                          tween the parties to the communication. The conversation ap-

PeaWvAe'Usdi =ropHa(lHl t(rPaWnsUmi )it?terdi)m. Aesdsdaigteiosn(aIlDly'A,Uiif,  an  adversary can        pears normal for both parties; however, all the information ex-
                                                                                 E(  HUi), EUi ), he
                                                                                                          changed passes through the attacker, and he can eavesdrop or

will be unable to use these parameters again for logging into                                             modify and re-send. We assume that the attacker has obtained
                                                                                                          (ID'AUi , EH(Ui), EUi ) and modified it as (IDA'*Ui , EH(Ui)*, EUi *);
the system, as these parameters are generated once for each

user’s login request. Therefore, our proposed scheme ensures                                              the modified parameters do not work, as CHSk verifies the
                                                                                                          ID'*AUi                                           that (IDA' Ui
perfect forward secrecy.                                                                                  ID'*AUi   that was sent by the Ui, and finds      EH(Ui), EUi )                                                           =?
                                                                                                                   ). Additionally, the message (IDA' Ui ,                                                                          is
     Proposition 4. Our proposed scheme can provide unlink-

ability.                                                                                                  generated once for each login phase. Thus, the proposed

     Proof. This feature verifies that a user can attempt several                                         scheme does not allow MITM attacks .

logins to the CHSK to consume resources/services without                                                  Proposition 7. Our proposed scheme is resistant to eaves-

others being able to connect the logins together to identify the                                          dropping.

person. In the proposed scheme, each time Ui wants to log into                                            Proof. This is the process of intercepting and examining
     psryismteitmiv,ehceomsupbomnietnsts(IoDf A'(UIDi , EA' UHi (,UEi)H,(EUUi)i,)E)Utio)
the                                                                                       CH   SK. Thus,  messages to extract information from them. All parameters
the                                                                                       are  generated
                                                                                                          exchanged between Ui and CHSk are the parameters used
once for each login phase by using the following points:                                                  only once (IDA' Ui , EH(Ui), EUi , ri, SKUi andVCUi ); therefore, if
   77   78   79   80   81   82   83   84   85   86   87