5,711 Hits in 5.2 sec

Cryptanalysis of Song's advanced smart card based password authentication protocol [article]

Juan E. Tapiador, Julio C. Hernandez-Castro, P. Peris-Lopez, John A. Clark
2011 arXiv   pre-print
Song Song10 proposed very recently a password-based authentication and key establishment protocol using smart cards which attempts to solve some weaknesses found in a previous scheme suggested by Xu, Zhu  ...  In this paper, we present attacks on the improved protocol, showing that it fails to achieve the claimed security goals.  ...  Similar protocols based on smart cards gained some popularity shortly after that. In such schemes, the user is provided with a card and a password as identification tokens.  ... 
arXiv:1111.2744v1 fatcat:xoogfn66bbd73blz2rtnxd4vsm

Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks [chapter]

Yongge Wang
2012 IFIP Advances in Information and Communication Technology  
These protocols are used for the protection of password based authentication between a client and a remote server.  ...  In this paper, we will focus on the password based authentication between a smart card owner and smart card via an untrusted card reader.  ...  Though these attacks are important for password-based authentication, they are not sufficient for passwordprotected smart card based remote authentication.  ... 
doi:10.1007/978-3-642-30436-1_40 fatcat:el2uxg2fn5ezhj63hj5mnzupee

Defining Security in Primary Key Infrastructures

Kurtis B Palmateer
2017 Journal of Information Technology & Software Engineering  
Smart card authentication is a methodology used for security across various network infrastructures that demand multiple factors in user authentication.  ...  Moreover, this paper looks into implementing network-wide smart card authentication on enterprise systems in an attempt to alleviate those systems of passwordbased authentication schemes.  ...  Introduction Advances in Information Assurance Security (IAS) Smart card technology: The smart card authentication schema is an advancement in network security that the Department of Defense (DoD) and  ... 
doi:10.4172/2165-7866.1000214 fatcat:64vi5hlyhvg4fgwue4sk27ba3q

Elliptic Curve Cryptography based Secure and Efficient Authentication Protocol for Smart Card Users

In this article, advanced and secure smart card based authentication protocol using elliptic curve cryptography (ECC) is proposed.  ...  Remote user authentication techniques using the smart card have been proposed by many researchers. The main benefit of using the smart card is the storage availability and the computation speed.  ...  Here with this paper an advanced and enhanced timestamp based authentication protocol for the remote user is proposed which overcomes all the limitations of Huang et al.'  ... 
doi:10.35940/ijitee.a7115.129219 fatcat:6qtc5rkulrfqjl5d5juz3y3gb4

A Novel Multiserver Authentication Protocol with Multifactors for Cloud Service

Jian Song, Guang-song Li, Bo-ru Xu, Chuan-gui Ma
2018 Security and Communication Networks  
Multifactor authentication protocols taking advantage of smart card, user's password, and biometric, are more secure than password-based single-factor authentication protocols which are widely used in  ...  However, most of the multiserver authentication protocols may have weak points, such as smart card loss attack, man-in-the-middle attack, anonymity, and high computation cost of authentication center.  ...  Therefore, the most commonly used authentication scheme in the current network is still single-factor authentication protocols based on password [4] .  ... 
doi:10.1155/2018/5432960 fatcat:l5pxbmgfhbdpzmnrpl4nspzznq

A Novel Secure Remote User Authentication Protocol using Three Factors

Yogita Borse, Irfan Siddavatam
2014 International Journal of Computer Applications  
According to the recent work done in the area of remote user authentication, biometrics based password authentication using smart card is the most interesting and upcoming technology.  ...  Many protocols has been designed aiming to combine three authentication factors efficiently in order secure the process of remote user authentication, but failed to do so.  ...  Ronggong Song has proposed a new efficient strong smart card based password authentication protocol that satisfies not only the minimum conditions but also advanced requirements like efficiency and mutual  ... 
doi:10.5120/15297-3985 fatcat:tuxqkpttobgx5c2ct6eevhtjgm

Cryptanalysis and security enhancement of an advanced authentication scheme using smart cards, and a key agreement scheme for two-party communication

Swapnoneel Roy, Amlan Kumar Das, Yu Li
2011 30th IEEE International Performance Computing and Communications Conference  
In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart cards.  ...  We observe that all smart card based authentication protocols which precede the one by Song, and require the server to compute the computationally intensive modular exponentiation, like the one by Xu et  ...  REVIEW OF SONG'S SCHEME We now briefly illustrate the password authentication scheme by Song [3] . This authentication scheme is based on a smart card.  ... 
doi:10.1109/pccc.2011.6108113 dblp:conf/ipccc/RoyDL11 fatcat:aaxhlpnp7neyvjzckuknclgili

Smart OpenID: A Smart Card Based OpenID Protocol [chapter]

Andreas Leicher, Andreas U. Schmidt, Yogendra Shah
2012 IFIP Advances in Information and Communication Technology  
In this paper, we present the concept of Smart OpenID, an enhancement to OpenID which moves part of the OpenID authentication server functionality to the smart card of the user's device.  ...  We also describe our implementation of the Smart OpenID protocol based on an Android phone, which interacts with OpenID-enabled web services.  ...  We have shown that by introducing an additional entity, the local OP, to existing smart card security, we can create a more secure OpenID implementation without requiring changes to the protocol.  ... 
doi:10.1007/978-3-642-30436-1_7 fatcat:vmhepojsz5dsfbdtwjccqbbwry

Cryptanalysis of Sun and Cao's Remote Authentication Scheme with User Anonymity [article]

Dheerendra Mishra
2014 arXiv   pre-print
Dynamic ID-based remote user authentication schemes ensure efficient and anonymous mutual authentication between entities.  ...  In 2013, Khan et al. proposed an improved dynamic ID-based authentication scheme to overcome the security flaws of Wang et al.'s authentication scheme.  ...  To achieve efficient and secure remote user services, low-cost smart card based authentication protocol has been presented to achieve a scalable solution.  ... 
arXiv:1310.6422v2 fatcat:gsx2k3iwyfd57e5mgtxndcgawe

Cryptanalysis and Security Enhancement of Two Advanced Authentication Protocols [chapter]

S. Raghu Talluri, Swapnoneel Roy
2014 Smart Innovation, Systems and Technologies  
., is a password-based authentication scheme 1 which does not use smart cards. We note that this scheme is an improvement over Chen et al.'  ...  The other protocol we consider for analysis is by Wang et al. This is a smart card based authentication protocol. We again perform the clogging (DoS) attack on this protocol via replay.  ...  The other protocol we consider by Wang et al. [3] is a smart card based authentication protocol. Smart card based password authentication (e.g.  ... 
doi:10.1007/978-3-319-07350-7_34 fatcat:jgunpltojbgw7iks6yg7s2c6xu

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems [chapter]

Yongge Wang
2017 Lecture Notes in Computer Science  
Though smart card based authentication techniques have been a successful solution for addressing key management challenges in several cryptographic authentication systems, they may not be applicable to  ...  smart meters and collectors), one generally needs to input a password or PIN number to the smart meters or collectors.  ...  Numerous smart card based cryptographic protocols rely on passwords selected by users (people) for strong authentication.  ... 
doi:10.1007/978-3-319-61437-3_7 fatcat:7inbc2l7efgsjces7v33jhrhrq

Integrating qualified electronic signatures with password legacy systems

Heiko Roßnagel, Jan Zibuschka
2014 Digital Evidence and Electronic Signature Law Review  
However, the high market penetration of smart cards does not necessarily lead to an increased number of signature transactions.  ...  for electronic signatures within the European Union, qualified electronic signatures have not been a market success, although several governments are issuing or plan to issue signature capable identity cards  ...  In addition to the capabilities of hash function based systems, the implementation takes full advantage of the strengths of smart card based two-factor authentication.  ... 
doi:10.14296/deeslr.v4i0.1792 fatcat:puam4sqklzciric3d3fbmbvz6a

Cryptanalysis of Multi-Server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Cards and Biometrics [article]

Dheerendra Mishra
2014 arXiv   pre-print
Recently, Chuang and Chen proposed an efficient multi-server authenticated key agreement scheme based on smart cards along with password and biometrics.  ...  These services adopt authentication and key agreement protocols to ensure authorized and secure access to resources.  ...  The smart card based authentication protocols are designed and developed to provide authorized and secure communication between the remote user and the server.  ... 
arXiv:1401.4790v1 fatcat:s3zj5ud3brhvnf7vn6aixvkmre

Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart Cards

Anuj Kumar Singh, Arun Solanki, Anand Nayyar, Basit Qureshi
2020 Applied Sciences  
In this paper, a smart card authentication protocol based on the concept of elliptic curve signcryption has been proposed and developed, which provides security attributes, including confidentiality of  ...  The results have demonstrated that the proposed smart card security protocol reduces the computational overhead on a smart card by 33.3% and the communication cost of a smart card by 34.5%, in comparison  ...  [9] developed the concept of the smart card and password-integrated authentication mechanism based on dynamic identity.  ... 
doi:10.3390/app10228291 fatcat:hrax7ytuozbtzlfzlxbyri3iba

Novel mutual authentication protocol for cloud computing using secret sharing and steganography

K. Nimmy, M. Sethumadhavan
2014 The Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2014)  
The proposed protocol provides mutual authentication and session key establishment between the users and the cloud server. Also, the users have been given the flexibility to change the password.  ...  The protocol is designed in such a way that it uses steganography as an additional encryption scheme. The scheme achieves authentication using secret sharing.  ...  Nan Chen and Rui Jiang [6] proposed an advanced authentication protocol.  ... 
doi:10.1109/icadiwt.2014.6814685 dblp:conf/icadiwt/NimmyS14 fatcat:7lyiotiumzgopoazcicjkvlhby
« Previous Showing results 1 — 15 out of 5,711 results