Two efficient two-factor authenticated key exchange protocols in public wireless LANs

  • Authors:
  • Wen-Shenq Juang;Jing-Lin Wu

  • Affiliations:
  • Department of Information Management, National Kaohsiung First University of Science and Technology, No. 1, University Road, YenChao, Kaohsiung County 824, Taiwan, ROC;Department of Information Management, Shih Hsin University, No. 1, Lane 17, Sec. 1, Muja Rd., Wenshan Chiu, Taipei, Taiwan 116, ROC

  • Venue:
  • Computers and Electrical Engineering
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recently, Parks et al. proposed an authentication and key agreement protocol for low-power PDAs in public wireless LANs using two factors including a password and a token, e.g. a smart card. They claimed that their proposed scheme provided mutual authentication, identity privacy, half-forward secrecy and low computation cost for a client including just one symmetric key encryption and five hash operations. In this paper, we point out that Park et al.'s protocol is vulnerable to the dictionary attack upon identity privacy. We propose two schemes with mutual authentication, half-forward secrecy, lower computation cost and less exchanged messages than Park et al.'s protocol. In additional to these properties, identity privacy, which is not satisfied by Park et al.'s protocol, is also provided by our second scheme.