A lightweight password-based authentication protocol using smart card

2017 ◽  
Vol 30 (16) ◽  
pp. e3336 ◽  
Author(s):  
Chenyu Wang ◽  
Ding Wang ◽  
Guoai Xu ◽  
Yanhui Guo

2021 ◽  
Author(s):  
Chandrashekhar Meshram ◽  
Rabha W. Ibrahim ◽  
Lunzhi Deng ◽  
Shailendra W. Shende ◽  
Sarita Gajbhiye Meshram ◽  
...  


2013 ◽  
Vol 303-306 ◽  
pp. 2182-2185
Author(s):  
Hui Liu

To access resources from a remote system, the user authentication is a very important security mechanism. Among remote authentication protocol, password-based authenticated key exchange protocol is most popular since the two communication entities only shared a human-memorable password can establish a session key which is used to protected their later communication over an insecure networks. Recently, Xu Zhu proposed improved password-based protocol using smart card based on previous research. He claims that his protocol is secure against various attacks. However, Song points out that the Xu Zhu’s protocol suffers from attacks. In addition, Song gives an improved version of Xu Zhu. In this paper, we first found Song’s protocol also is vulnerable to off-line dictionary attack. Later, we extend Song’s protocol so that the extended protocol can resist to off-line dictionary attack even if an adversary captures the smart card.





2005 ◽  
Vol 9 (1) ◽  
pp. 93-95 ◽  
Author(s):  
Taekyoung Kwon ◽  
Young-Ho Park ◽  
Hee Jung Lee


2020 ◽  
Vol 115 (4) ◽  
pp. 2779-2803
Author(s):  
T. Sudhakar ◽  
V. Natarajan ◽  
M. Gopinath ◽  
J. Saranyadevi


2020 ◽  
Vol 51 ◽  
pp. 102443 ◽  
Author(s):  
Adesh Kumari ◽  
Srinivas Jangirala ◽  
M. Yahya Abbasi ◽  
Vinod Kumar ◽  
Mansaf Alam




2020 ◽  
Vol 10 (22) ◽  
pp. 8291
Author(s):  
Anuj Kumar Singh ◽  
Arun Solanki ◽  
Anand Nayyar ◽  
Basit Qureshi

In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective design and efficient security scheme. In this paper, a smart card authentication protocol based on the concept of elliptic curve signcryption has been proposed and developed, which provides security attributes, including confidentiality of messages, non-repudiation, the integrity of messages, mutual authentication, anonymity, availability, and forward security. Moreover, the analysis of security functionalities shows that the protocol developed and explained in this paper is secure from password guessing attacks, user and server impersonation, replay attacks, de-synchronization attacks, insider attacks, known key attacks, and man-in-the-middle attacks. The results have demonstrated that the proposed smart card security protocol reduces the computational overhead on a smart card by 33.3% and the communication cost of a smart card by 34.5%, in comparison to the existing efficient protocols. It can, thus, be inferred from the results that using elliptic curve signcryption in the authentication mechanism reduces the computational cost and communication overhead by a significant amount.



2014 ◽  
Vol 8 (5) ◽  
pp. 903-910 ◽  
Author(s):  
Hang Tu ◽  
Neeraj Kumar ◽  
Naveen Chilamkurti ◽  
Seungmin Rho


Sign in / Sign up

Export Citation Format

Share Document