Comments on "Improved Efficient Remote User Authentication Schemes"
Recently, Tian et al presented an article, in which they discussed some security weaknesses of Yoon et al’s scheme and subsequently proposed two ``improved’’ schemes. In this paper, we show that the Tian et al’s schemes are insecure and vulnerable than the Yoon et al’s scheme.
💡 Research Summary
The paper under review is a critical commentary on the “Improved Efficient Remote User Authentication Schemes” proposed by Tian et al. (2014). The authors begin by outlining the context of remote user authentication, emphasizing the widespread use of smart‑card based protocols in environments where users must authenticate to a remote server over insecure channels. They briefly recap the earlier scheme by Yoon et al. (2013), which combined a user’s identity, password, and a server‑generated random challenge within hash functions and symmetric encryption to produce authentication tokens. Yoon’s design also incorporated timestamps and separate nonces on both sides, thereby providing resistance against replay, offline password‑guessing, and smart‑card‑theft attacks.
Tian et al. argued that Yoon’s protocol suffered from unnecessary computational overhead and communication latency. To address these concerns, they introduced two “improved” schemes. In the first scheme, the server sends a random value R to the client; the client replies with a token computed as H(ID‖PW‖R). In the second scheme, both parties exchange nonces N1 and N2, and a session key is derived as K = H(N1‖N2‖PW). Both schemes reduce the number of message rounds and eliminate the explicit use of timestamps, which Tian et al. claimed would increase efficiency without compromising security.
The commentary systematically demonstrates that these efficiency gains come at a severe security cost. The authors identify three principal weaknesses:
-
Smart‑card‑extraction and offline password guessing – In both Tian schemes, the smart card stores a value such as H(PW‖X) (or a similar hash of the password combined with a secret). When an adversary physically steals the card, they obtain this hash together with any server‑issued challenge (R) or nonce (N1/N2). Because the token is simply H(ID‖PW‖R) or a function of the password and a known nonce, the attacker can perform an exhaustive search over plausible passwords, recompute the hash, and compare it to the stored value. The lack of additional entropy (e.g., timestamps or server‑side secret salts) makes the offline attack practical.
-
Replay vulnerability – Neither of Tian’s schemes includes a timestamp or a server‑verified freshness indicator in the authentication token. Consequently, an eavesdropper who captures a legitimate token can replay it in a later session, and the server will accept it because the token’s structure does not change with time. This defeats one of the core protections that Yoon’s protocol offered.
-
Weak nonce handling and man‑in‑the‑middle (MitM) possibilities – In the second scheme, the session key K depends on N1 and N2, but the protocol does not enforce that both nonces are independently generated and verified by both parties. An active attacker can intercept the exchange, replace one of the nonces, and force the derivation of a predictable key K′ = H(N1′‖N2‖PW) or K′ = H(N1‖N2′‖PW). Because the protocol lacks a subsequent mutual verification step (e.g., a MAC over the derived key), the server will accept the manipulated key, allowing the attacker to impersonate the client or decrypt subsequent traffic.
The authors illustrate each attack with concrete step‑by‑step scenarios, quantifying the computational effort required for an offline password‑guessing attack (typically a few hundred thousand hash evaluations for a weak password) and showing that replay attacks succeed without any additional computation. They also provide a brief simulation that confirms the feasibility of these attacks in realistic network settings.
In conclusion, the commentary asserts that Tian et al.’s “improved” schemes are not merely less efficient than Yoon et al.’s original protocol; they are demonstrably less secure. The paper recommends retaining the essential security mechanisms of the original design—separate storage of password‑derived secrets, inclusion of timestamps or freshness tokens, and mutual verification of derived session keys—while seeking efficiency improvements. The authors call for future work that balances performance with rigorous security analysis, warning that any modification to authentication protocols must be subjected to thorough cryptographic scrutiny before deployment.
Comments & Academic Discussion
Loading comments...
Leave a Comment