A 3-D Geometry based Remote Login 2-Way Authentication Scheme using Smart Card
Автор: Hari Om, Vishavdeep Goyal, Kunal Gupta
Журнал: International Journal of Computer Network and Information Security(IJCNIS) @ijcnis
Статья в выпуске: 8 vol.7, 2015 года.
Бесплатный доступ
The computer networks have made possible to access data remotely and they have made possible to login into a system located at far distance; it may be in a different city or in a different country other than the user's native place. The main issue in such an environment is related to the authenticity of the user's identity by the system. This requires to have some mechanism to authenticate a remote user for his legitimacy. In this paper, we propose a method, which is based on a 3-D Geometric approach, to authenticate the login request sent by a user, who is located at far distance. In this method, we provide two-way mutual authentication in which a legitimate user is authenticated by the server and the server is authenticated by the user. This method first performs initialization in which the required parameters are set to create an environment with the central authority. It then allows a user to register with the system/server. Once a user is registered, he is allowed to login to the system for accessing the required information. Our scheme provides a facility to a legitimate user for changing his password of his choice. This scheme withstands with several attacks without requiring much computational overhead.
Authentication, smartcard, central authority, 3-D Euclidean geometry
Короткий адрес: https://sciup.org/15011449
IDR: 15011449
Список литературы A 3-D Geometry based Remote Login 2-Way Authentication Scheme using Smart Card
- L. Lamport, "Password authentication with insecure communication," Communications of the ACM, vol. 24(11), pp. 770– 772, 1981.
- C. C. Chang, T. C. Wu, "Remote password authentication with smart cards," IEE Proc.-E, Vol. 138, no. 3, pp. 165-168, 1991.
- T. Hwang, Y. Chen, and C. S. Laih, "Non-interactive password authentications without password tables," Proc. of IEEE Region 10th Conf on Computer and Communication Systems, 1990, pp. 429– 431.
- G. R. Blakley and D. Chaum (Eds.): Advances in Cryptology - CRYPT0 '84, LNCS 196, pp. 47-53, 1985, Spnnger-Verlag Berlln Heldelberg 1985.
- T. C. Wu, "Remote login authentication scheme based on a geometric approach," Computer Communication, Vol. 18, No. 12, pp. 959-963, 1995.
- M. S. Hwang and L. H. Li, "A new remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, Vol. 46(1), pp. 28– 30, 2000.
- A. K. Awasthi and Sunder Lal, "A Remote User Authentication Scheme using Smart Cards with Forward Security," IEEE Transactions on Consumer Electronics, Vol. 49, no. 4, pp. 1246-1248, 2003.
- 8. E.J. Yoon, E.K. Ryu, and K.Y. Yoo, "Further improvement of an efficient password based remote user authentication scheme using smart cards", IEEE Trans. Consumer Electronic, Vol. 50(2), pp. 612-614, 2004.
- H. Y. Chien, J. K. Jan, and Y. M. Tseng, "An efficient and Practical solution to remote authentication: smart card," Computer & Security, Vol. 21(4), pp. 372-375, 2002.
- W. H Yang and S. P Sheih, "Password authentication scheme with smart cards", Computer and Security, Vol. 18(8), pp 727-733, 1999.
- S. J. Wang and J. F. Chang, "Smart card based secure password authentication scheme," Computers & Security, Vol. 15, No. 3, pp. 231–237, 1996.
- C. K. Chan and L. M. Cheng, "Cryptanalysis of a timestamp-based password authentication scheme," Computers and Security, Vol. 21 (1), pp. 74–76, 2002.
- H. M Sun and H. T Yeh, "Further cryptanalysis of a password authentication scheme with smart cards," IEICE Transaction on Communication, vol. E86-B, no. 4, pp. 1412-1415, 2003.
- C. C Yang, R. C Wang, and T. Y Chang, "An improvement of the Yang-Shieh password authentication scheme," Applied Mathematics and computation, vol 162, no. 3 1391-1396, 2005.
- L. H. Li, L. C. Lin and M. S. Hwang, A remote password authentication scheme for multiserver architecture using neural networks," IEEE Trans on Neural networks, Vol. 12, No. 6, pp. 1498-1504, 2001.
- C. M. Chen and W. C. Ku, "Stolen verifier attack on two new strong- password authentication protocol," IEICE Trans. on communications E85 – B(11), pp. 2519 – 2521, 2002.
- L. Fan, J. H. Li, and H. W. Zhu, "An enhancement of timestamp-based password authentication scheme", Computers and Security, Vol. 21(7), pp.665-667, 2002.
- S. K Pathan and C. S Hong, "Cryptanalysis of Yang-Wang-Chang's password authentication scheme with smart cards," Proc. of ICACT 2008, pp. 1618-1620, Feb. 2008.
- K. W Kim, J. C Jeon and K. Y Yoo, "An improvement on Yang et al's password authentication scheme," Applied Mathematics and Computation, vol. 170, pp. 207-215, 2005.
- M. Kumar, "New Remote user authentication scheme using smart card," IEEE Transaction on Consumer Electronics, vol. 50, no. 2, pp. 597-600, May 2004.
- M. Kumar, "An enhanced remote user authentication scheme with smart card", International Journal of Network security, vol. 10, no. 3, pp. 175-184, May 2010.
- X. Li, J. Niu, M. K.Khan, and J. Liao, "An enhanced smart card based remote user password authentication scheme," Journal of Network and Computer Applications, Vol. 36, Issue 5, pp. 1365–1371, Sept. 2013.
- L. Siwik and L. Mozgowoj, "Server-Side Encrypting and Digital Signature Platform with Biometric Authorization," I. J. Computer Network and Information Security, Vol. 7, No. 4, pp. 1-13, 2015.
- C.S. Bindu, "Secure Usable Authentication Using Strong Pass text Passwords," I.J. Computer Network and Information Security, Vol. 7(4), pp. 57-64, 2015.
- S. Nandi, S. Roy, J. Dansana, W. B. A. Karaa, and R. Ray, "Cellular Automata based Encrypted ECG-hash Code Generation: An Application in Inter-human Biometric Authentication System," I.J. Computer Network and Information Security, Vol. 6(11), pp. 1-12, 2014.
- V. K. Narendira Kumar and B. Srinivasan, "Design and Development of Biometrics Secure Person Detection System for E-Passport using Cryptographic Security Protocols," I. J. Computer Network and Information Security, Vol. 5(12), pp. 80-90, 2013.