How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security
Abstract
:1. Introduction
- (A1) Replay attack: this is a type of man-in-the-middle attack, where the attacker maliciously repeats or delays a valid data transmission.
- (A2) Privileged insider attack (user/server impersonation attack): a legal user or a legal server has the ability to impersonate another user or server.
- (A3) Smart-card-loss-attack (offline password/identity guessing attack): when an attacker steals the smart card of a user, the attacker can guess the password or identity of the user offline.
- (A4) Failure to ensure forward secrecy: the session keys are compromised because the long-term secret keys are compromised.
- (A5) Failure to provide user anonymity: the real identity of an anonymous user is disclosed to the third party.
1.1. Contribution
1.2. Organization
2. Threat Model
- (AC1) They have the ability to replay, eavesdrop, modify, or delete the transmission over an insecure channel [27].
- (AC2) They may be an outsider or any one of the legitimate members [27].
- (AC3) They might try all of the (identity ID, password PW) pairs offline within probabilistic polynomial time [28].
- (AC5) They have the ability to fake biometric authentication [31].
- (AC6) They have the ability to individually fake biometric authentication, obtain the (identity, password) pair, and obtain the sensitive information in a smart card. However, the adversary cannot break them all within probabilistic polynomial time.
3. Discussion of the Occurrence of Security Defects
3.1. Why Does an AAKA Protocol with a Formal Proof Still Have Security Defects?
3.2. Common Design Defects
3.2.1. Failure to Withstand Malignant Server Attacks in a Multi-Server Environment
3.2.2. Failure to Withstand Malignant User Attacks
3.2.3. Failure to Provide User Anonymity
3.2.4. Failure to Provide User Untraceability
3.3. How to Simultaneously Achieve Public Key Announcement-Free, Table-Free, and Independent Authentication
4. How to Design a Secure AAKA Protocol
- (1)
- (2)
- Computational Diffie–Hellman (CDH) problem [36]: Given ga mod q and gb mod q for unknown a, b ∊ Zq*, to find gab.
- (3)
- (4)
- Without loss of generality, let E be an elliptic curve over a finite field Fq, which is a field of integers modulo a large prime number q, and E(Fq) denotes the set of all the points on E. Let G1 be an additive cyclic subgroup of points on E(Fq), a point P be a generator of G1, and G2 be a multiplicative group with the same order q.
- (5)
- Elliptic curve discretelogarithm (ECDL) problem [37]: Given a point Q = dP ∊ G1, to determine the integer d.
- (6)
- Elliptic curve computational Diffie–Hellman (ECCDH) problem [37]: Given P, aP, bP ∊ G1 for random a, b ∊ Zq*, to find abP ∊ G1.
- (7)
- Elliptic curve decision Diffie–Hellman (ECDDH) problem [37]: Given P, aP, bP, cP∊G1 for random a, b, c∊Zq*, to determine whether cP = abP. Note that DDH problem in bilinear pairing is easy: it is easy to verify if ê (aP, bP) = ê (P, cP).
- (8)
- Bilinear Diffie–Hellman (BDH) problem in [G1, G2, ê] [37]: Given P, aP, bP, cP ∊ G1 for random a, b, c ∊ Zq*, to find ê (P, P)abc.
- (9)
- Decisional bilinear Diffie–Hellman (DBDH) problem in [G1, G2, ê] [37]: Given P, aP, bP, cP∊G1 and ê(P, P)d ∊G2 for random a, b, c, d∊Zq*, to determine whether ê (P, P)d = ê (P, P)abc.
- (1)
- To avoid insider (malignant server) attacks in multi-server environments, the servers are regarded as independent entities that cannot have the same secret keys and cannot obtain any user’s secret key (R5).
- (2)
- To avoid insider attacks, including malignant users and malignant servers, the authenticity of members cannot be confirmed by the same value, and a member cannot obtain any other member’s secret key (R6).
- (3)
- To achieve user anonymity, do not adopt a duplicated value to mask the duplicated value (R7).
- (4)
- To achieve user untraceability, do not transmit duplicate values in different sessions (R8).
- (5)
- The following are three approaches that a user can take to allow the server to secretly obtain the user’s identity to achieve user anonymity in an AAKE protocol (R9):
- Approach 1:
- Approach 2:
- Approach 3:
- (1)
- Prove that the common session key established by each entity is identical;
- (2)
- Burrows–Abadi–Needham logic (BAN logic) [32] may be adopted to prove the correctness of the protocol.
5. How to Prove the Security of an AAKA Protocol
5.1. Misconceptions about the Proof
- (1)
- A random oracle model is one type of security model that adopts random oracles to simulate hash functions [34]. Note that a single random oracle is only a query-response process, which produces random responses; it is not a security model (R2).
- (2)
- BAN logic [32] can ensure the correctness of a protocol, but it may fail to ensure the security of a protocol when the security assumptions are no longer present in the applied circumstance (R3).
- (3)
- An AVISPA simulation tool [33] cannot ensure security against insider attacks (R4).
5.2. The Method to Prove the Security
- (1)
- The security of an AAKA protocol must be given a formal proof in a (formal) security model. The security of an AAKA protocol must be based on a well-known hard problem and mathematical assumptions, meaning that if there is an attacker who can successfully attack the protocol, then the administrator can use the ability of the attacker breaking the security of the protocol to solve the well-known hard problem [36] (R1).
- (2)
- Some trust methods through machine learning [38] might provide another way to confirm the security of an AAKA protocol.
- (3)
- Prove the security by the following steps:
- Step 1
- Clearly state the well-known hard problem and mathematical assumptions. That is, the protocol is secure only if the hard problem is unsolvable.
- Step 2
- Construct a security model, which is also called an adversary model. This includes queries that are asked by the adversary and answered by the challenger (protocol). Queries should model all of the possible adversary behaviors (attack capabilities), such as passive attacks, active attacks, insider attacks, and forward secrecy attacks. A random oracle is usually used as a hash function that the challenger can control the output value through [34].
- Step 3
- Permeate the well-known hard problem through queries, which are asked by the adversary and answered by the challenger. Prove that if the adversary can break the protocol with a non-negligible advantage ε, then the challenger can solve the hard problem with a non-negligible advantage ε’, where ε’ is related to ε. This is in contradiction to the mathematical assumption. Since the hard problem cannot be solved with a non-negligible advantage in probabilistic polynomial time (PPT), no adversary can break the protocol with a non-negligible advantage in PPT. Q.E.D.
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Lamport, L. Password authentication with insecure communication. Commun. ACM 1981, 24, 770–772. [Google Scholar] [CrossRef]
- Hwang, T.; Chen, Y.; Laih, C.J. Non-interactive password authentications without password tables. In Proceedings of the IEEE TENCON’90: 1990 IEEE Region 10 Conference on Computer and Communication Systems. Conference Proceedings, Hong Kong, China, 24–27 September 1990. [Google Scholar]
- Boneh, D.; Demillo, R.A.; Lipton, R.J. On the importance of checking cryptographic protocols for faults. In EUROCRYPT; Springer: Berlin/Heidelberg, Germany, 1997; pp. 37–51. [Google Scholar]
- Brumley, D.; Boneh, D. Remote timing attacks are practical. Comput. Netw. 2005, 48, 701–716. [Google Scholar] [CrossRef]
- Biham, E.; Carmeli, Y.; Shamir, A. Bug attacks. In Annual International Cryptology Conference; Springer: Santa Barbara, CA, USA, 2008; pp. 221–240. [Google Scholar]
- Chuang, M.C.; Chen, M.C. An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Syst. Appl. 2014, 41, 1411–1418. [Google Scholar] [CrossRef]
- Lin, H.; Wen, F.; Du, C. An improved anonymous multi-server authenticated key agreement scheme using smart cards and biometrics. Wirel. Pers. Commun. 2015, 84, 2351–2362. [Google Scholar] [CrossRef]
- He, D.; Wang, D. Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst. J. 2015, 9, 816–823. [Google Scholar] [CrossRef]
- Jiang, P.; Wen, Q.; Li, W.; Jin, Z.; Zhang, H. An anonymous and efficient remote biometrics user authentication scheme in a multi server environment. Front. Comput. Sci. 2015, 9, 142–156. [Google Scholar] [CrossRef]
- Odelu, V.; Das, A.K.; Goswami, A. A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1953–1966. [Google Scholar] [CrossRef]
- Hsieh, W.B.; Leu, J.S. An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures. J. Supercomput. 2014, 70, 133–148. [Google Scholar] [CrossRef]
- Amin, R.; Biswas, G. Design and analysis of bilinear pairing based mutual authentication and key agreement protocol usable in multi-server environment. Wirel Pers. Commun. 2015, 84, 439–462. [Google Scholar] [CrossRef]
- Chandrakar, P.; Om, H. Cryptanalysis and improvement of a biometric-based remote user authentication protocol usable in a multiserver environment. Trans. Emerg. Tel. Tech. 2017, 28, e3200. [Google Scholar] [CrossRef]
- Chandrakar, P.; Om, H. A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC. Comput. Commun. 2017, 110, 26–34. [Google Scholar] [CrossRef]
- Park, Y.; Park, Y. Three-factor user authentication and key agreement using elliptic curve cryptosystem in wireless sensor networks. Sensors 2016, 16, 2123. [Google Scholar] [CrossRef] [PubMed]
- Chang, I.P.; Lee, T.F.; Lin, T.H.; Liu, C.M. Enhanced two-factor authentication and key agreement using dynamic identities in wireless sensor networks. Sensors 2015, 15, 29841–29854. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Choi, Y.; Nam, J.; Lee, D.; Kim, J.; Jung, J.; Won, D. Security improvement on biometric based authentication scheme for wireless sensor networks using fuzzy extraction. Int. J. Distrib. Sens. Netw. 2016, 2016, 1–16. [Google Scholar]
- Yoon, E.J.; Kim, C. Advanced biometric-based user authentication scheme for wireless sensor networks. Sens. Lett. 2013, 11, 1836–1843. [Google Scholar] [CrossRef]
- Irshad, A.; Sher, M.; Chaudhary, S.A.; Naqvi, H.; Farash, M.S. An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre. J. Supercomput 2016, 72, 1623–1644. [Google Scholar] [CrossRef]
- Reddy, A.G.; Yoon, E.J.; Das, A.K.; Odelu, V.; Yoo, K.Y. Design of mutually authenticated key agreement protocol resistant to impersonation attacks for multi-server environment. IEEE Access 2017, 5, 3622–3639. [Google Scholar] [CrossRef]
- Xu, D.; Chen, J.; Liu, Q. Provably secure anonymous three-factor authentication scheme for multi-server environments. J. Ambient Intell. Humaniz. Comput. 2019, 10, 611–627. [Google Scholar] [CrossRef]
- Qi, M.; Chen, J.; Chen, Y. A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC. Comput. Methods Programs Biomed. 2018, 164, 101–109. [Google Scholar] [CrossRef]
- Ali, R.; Pal, A.K. An efficient three factor–based authentication scheme in multiserver environment using ECC. Commun. Syst. 2018, 31, e3483. [Google Scholar] [CrossRef]
- Chuang, Y.H.; Lei, C.L.; Shiu, H.J. Cryptanalysis of four biometric based authentication schemes with privacy-preserving for multi-server environment and design guidelines. In Proceedings of the 15th Asia Joint Conference on Information Security, Taipei, Taiwan, 20–21 August 2020; pp. 66–73. [Google Scholar]
- Wu, J.D.; Tseng, Y.M.; Huang, S.S. An identity-based authenticated key exchange protocol resilient to continuous key leakage. IEEE Syst. J. 2019, 13, 3968–3979. [Google Scholar] [CrossRef]
- Hsieh, T.C.; Tseng, Y.M.; Huang, S.S. A leakage-resilient certificateless authenticated key exchange protocol withstanding side-channel attacks. IEEE Access 2020, 8, 121795–121810. [Google Scholar] [CrossRef]
- Tiburski, R.T.; Amaral, L.A.; Hessel, F. Security challenges in 5G-Based IoT middleware systems. In Internet of Things (IoT) in 5G Mobile Technologies, Modeling and Optimization in Science and Technologies; Mavromoustakis, C., Mastorakis, G., Batalla, J., Eds.; Springer: Cham, Switzerland, April 2016; Volume 8, pp. 399–418. [Google Scholar]
- Wang, D.; Wang, P. Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE Trans Dependable Secur. Comput. 2018, 15, 708–722. [Google Scholar] [CrossRef]
- Kocher, P.; Jaff, J.; Jun, B. Differential power analysis. In Proceedings of the Annual International Cryptology Conference; Springer: Santa Barbara, CA, USA, 1999; pp. 388–397. [Google Scholar]
- Messerges, T.S.; Dabbish, E.A.; Sloan, R.H. Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 2002, 51, 541–552. [Google Scholar] [CrossRef] [Green Version]
- Rane, S.; Wang, Y.; Draper, S.C.; Ishwar, P. Secure biometrics: Concepts, authentication architectures, and challenges. IEEE Signal Process Mag. 2013, 30, 51–64. [Google Scholar] [CrossRef] [Green Version]
- Burrows, M.; Abadi, M.; Needham, R. A logic of authentication. ACM Trans. Comput. Syst. 1990, 8, 18–36. [Google Scholar] [CrossRef]
- Vigano, L. Automated security protocol analysis with the AVISPA tool. Electron. Notes Theor. Comput. Sci. 2006, 155, 61–86. [Google Scholar] [CrossRef] [Green Version]
- Bellare, M.; Rogaway, P. Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the ACM conference on Computers and Communication Security, Fairfax, VI, USA, 3–5 November 1993; pp. 62–73. [Google Scholar]
- Boneh, D. The decision Diffie-Hellman problem. In Third Algorithmic Number Theory Symposium, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 1998; Volume 1423, pp. 48–63. [Google Scholar]
- Bellare, M.; Rogaway, P. Introduction to Modern Cryptography; University of California at Davis: Davis, CA, USA, 2005. [Google Scholar]
- Boneh, D.; Franklin, M. Identity-based encryption from the Weil pairing. In Proceedings of the 21st Annual International Cryptology Conference (Crypto 2001), Santa Barbara, CA, USA, 19–23 August 2001; Springer: Santa Barbara, CA, USA, 2001; Volume 2139, pp. 213–229. [Google Scholar]
- He, Y.; Han, G.; Jiang, J.; Wang, H.; Martinez-Garcia, M. A trust update mechanism based on reinforcement learning in underwater acoustic sensor networks. IEEE Trans. Mob. Comput. 2020. [Google Scholar] [CrossRef]
Protocol | Security Defect |
---|---|
Chuang–Chen protocol [6] | (A2, A5) [7] |
Lin et al. [7] | - |
He–Wang [8] | (A2) [10] |
Jiang et al. [9] | - |
Odelu et al. [10] | - |
Amin–Biswas [12] | (A2, A3) [13] |
Chandrakar–Om [13] | (A2) [24] |
Chandrakar–Om [14] | (A2) [24]. |
Park–Park [15] | (A5) [24] |
Choi et al. [17] | - |
Irshad et al. [19] | - |
Reddy et al. [20] | (A2, A5) [21] |
Qi et al. [22] | - |
Xu et al. [21] | - |
Ali-Pal [23] | (A2) [24] |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chuang, Y.-H.; Lei, C.-L.; Shiu, H.-J. How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security. Symmetry 2021, 13, 1629. https://doi.org/10.3390/sym13091629
Chuang Y-H, Lei C-L, Shiu H-J. How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security. Symmetry. 2021; 13(9):1629. https://doi.org/10.3390/sym13091629
Chicago/Turabian StyleChuang, Yun-Hsin, Chin-Laung Lei, and Hung-Jr Shiu. 2021. "How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security" Symmetry 13, no. 9: 1629. https://doi.org/10.3390/sym13091629
APA StyleChuang, Y. -H., Lei, C. -L., & Shiu, H. -J. (2021). How to Design a Secure Anonymous Authentication and Key Agreement Protocol for Multi-Server Environments and Prove Its Security. Symmetry, 13(9), 1629. https://doi.org/10.3390/sym13091629