A robust smart card and remote user password-based authentication protocol using extended chaotic maps under smart cities environment

2021 ◽  
Author(s):  
Chandrashekhar Meshram ◽  
Rabha W. Ibrahim ◽  
Lunzhi Deng ◽  
Shailendra W. Shende ◽  
Sarita Gajbhiye Meshram ◽  
...  

Communication scheme which is used to have communication between authorized remote users over an insecure network is generally the authentication scheme which uses the password for the authentication. Remote user authentication techniques using the smart card have been proposed by many researchers. The main benefit of using the smart card is the storage availability and the computation speed. Huang et al. proposed a scheme for user authentication with smart cards which uses the concept of the timestamp. In Huang et al.’s protocol authors argued that their protocol is secure and efficient against any type of attack. Unfortunately Jung et al. show that Huang et al.’s model fails against the offline password guessing attack and with this scheme wrong password detection is not easy. In Huang et al.’s scheme, RSA cryptosystem is used to offer the authentication. In this article, advanced and secure smart card based authentication protocol using elliptic curve cryptography (ECC) is proposed. This proposed scheme thus overcomes all the possible drawbacks of Huang et al.’s scheme, and it has faster computation as compared to the available schemes



2017 ◽  
Vol 30 (16) ◽  
pp. e3336 ◽  
Author(s):  
Chenyu Wang ◽  
Ding Wang ◽  
Guoai Xu ◽  
Yanhui Guo


2013 ◽  
Vol 303-306 ◽  
pp. 2182-2185
Author(s):  
Hui Liu

To access resources from a remote system, the user authentication is a very important security mechanism. Among remote authentication protocol, password-based authenticated key exchange protocol is most popular since the two communication entities only shared a human-memorable password can establish a session key which is used to protected their later communication over an insecure networks. Recently, Xu Zhu proposed improved password-based protocol using smart card based on previous research. He claims that his protocol is secure against various attacks. However, Song points out that the Xu Zhu’s protocol suffers from attacks. In addition, Song gives an improved version of Xu Zhu. In this paper, we first found Song’s protocol also is vulnerable to off-line dictionary attack. Later, we extend Song’s protocol so that the extended protocol can resist to off-line dictionary attack even if an adversary captures the smart card.





Sign in / Sign up

Export Citation Format

Share Document