Cryptanalysis and improvement of ‘a secure authentication scheme for telecare medical information system’ with nonce verification

Dr. Zeeshan Siddiqui, Muhammad Khurram Khan, Abdul Hanan Abdullah, Abdullah Alghamdi

Research output: Contribution to journalArticlepeer-review

4 Citations (Scopus)


In 2009, Xu et al. presented an improved smartcard based authentication scheme while using a security model previously applied by Bellare et al. to prove the security of their authentication methods. Later on, in 2012, Wu et al. pointed out number of authentication attacks in Xu et al. scheme. To address these issues, Wu et al. presented a Smartcard based Two-Factor Authentication (2FA) scheme for Telecare Medical Information System (TMIS) facility. In this study, we prove that authentication scheme of Wu et al. is still vulnerable to impersonation attack, offline password guessing attack, forgery attack and many other attacks. Moreover, number of performance and verification issues are also outlined in the authentication scheme of Wu et al. To overcome these issues, an improved and enhanced 3FA Smartphone based authentication method is proposed on a Cloud Computing environment. The proposed scheme is further corroborated using Burrows-Abadi-Needham logic (BAN logic) nonce verification. The detailed BAN logic verification and further security analysis shows that the proposed authentication protocol is highly reliable and secure in terms of message verifications, message freshness and trustworthiness of its origin. Moreover, the comparative security, performance and feature analysis shows that the proposed work yields an even more improved and enhanced authentication framework as compared to Wu et al. authentication scheme.
Original languageEnglish
Pages (from-to)841-853
Number of pages13
JournalPeer-to-Peer Networking and Applications
Issue number5
Early online date23 May 2015
Publication statusE-pub ahead of print - 23 May 2015
Externally publishedYes


  • Smartphone
  • Smartcard
  • remote user authentication
  • Authentication protocols
  • Three-factor authentification
  • Telecare medical information system
  • TMIS
  • BAN logic
  • Cloud computing


Dive into the research topics of 'Cryptanalysis and improvement of ‘a secure authentication scheme for telecare medical information system’ with nonce verification'. Together they form a unique fingerprint.

Cite this