Comment on Xu et al.'s Key Agreement and Password Authentication Protocol

2011 ◽  
Vol 121-126 ◽  
pp. 3847-3849
Author(s):  
Yong Ning Guo ◽  
Cheng Lian Liu

The Internet has been population, which it was implement information technology, to every enterprize, also changed their contact mode of information flow style. Since public key conception was proposed, it had authentication function to secure while they are communication, and defense the data to leak based on stranger. In 2010, Xu et al. proposed an improvement of generalized key agreement and password authentication protocol which it based on linear equation in two unknown of congruence. In this paper, we pointed out some errors. Thus, the Xu et al.'s improved scheme may not becomes to be correction

2011 ◽  
pp. 42-87
Author(s):  
Ashutosh Deshmukh

The Internet spins a vast web of information across the globe. Data and information flow freely — available to anyone for learning, understanding and analysis. Organizations can cooperate across departments, regions and countries. ERP II and ECM herald the era of intra- and inter-business collaboration. Sounds wonderful – what is the problem? The problem is as old as mainframe vs. PC and Windows vs. Macintosh. Data can move freely but are not standardized. Data streams have no universal meanings; consequently, data are not understood by all systems, analyzed easily, translated across different languages and human readable, among other things. Specialized hardware and software is needed for data decoding, and if the required tools are not available, then you are out of luck. This problem is not only confined to the Internet. A great deal of money (by one estimate, almost 20% of the U.S. gross national product) is spent on generating new information, and more than 90% of this information is in documents, not in databases. Businesses in the U.S. produce approximately 100 billion documents per year. This information is stored in various formats across a range of computer systems. These disparate storage formats cause severe problems in accessing, searching and distributing this information. Any solution (a combination of information technology products and services) that manages information across diverse software and hardware platforms must address a few key requirements. First, these solutions should be transparent to users. The technical details should not be handled by users. Second, users should be able to save data and information in the desired format; for example, databases, text files or proprietary formats. Third, a solution must intelligently retrieve data and information. This solution should be knowledgeable regarding meaning of the information itself. Finally, such solution should be capable of providing the desired output — print, screen, Web or CD/DVD format.


Sensors ◽  
2020 ◽  
Vol 20 (18) ◽  
pp. 5350
Author(s):  
Dae-Hwi Lee ◽  
Im-Yeong Lee

In the Internet of Things (IoT) environment, more types of devices than ever before are connected to the internet to provide IoT services. Smart devices are becoming more intelligent and improving performance, but there are devices with little computing power and low storage capacity. Devices with limited resources will have difficulty applying existing public key cryptography systems to provide security. Therefore, communication protocols for various kinds of participating devices should be applicable in the IoT environment, and these protocols should be lightened for resources-restricted devices. Security is an essential element in the IoT environment, so for secure communication, it is necessary to perform authentication between the communication objects and to generate the session key. In this paper, we propose two kinds of lightweight authentication and key agreement schemes to enable fast and secure authentication among the objects participating in the IoT environment. The first scheme is an authentication and key agreement scheme with limited resource devices that can use the elliptic curve Qu–Vanstone (ECQV) implicit certificate to quickly agree on the session key. The second scheme is also an authentication and key agreement scheme that can be used more securely, but slower than first scheme using certificateless public key cryptography (CL-PKC). In addition, we compare and analyze existing schemes and propose new schemes to improve security requirements that were not satisfactory.


Author(s):  
NIVEDITA DATTA

In many applications, the password is sent as cleartext to the server to be authenticated thus providing the eavesdropper with opportunity to steal valuable data. This paper presents a simple protocol based on zero knowledge proof by which the user can prove to the authentication server that he has the password without having to send the password to the server as either cleartext or in encrypted format. Thus the user can authenticate himself without having to actually reveal the password to the server. Also, another version of this protocol has been proposed which makes use of public key cryptography thus adding one more level of security to the protocol and enabling mutual authentication between the client & server.


2021 ◽  
Author(s):  
Jing Liu ◽  
Yixin Liu ◽  
Yingxu Lai ◽  
Rongchen Li ◽  
Siyu Wu ◽  
...  

With the rising popularity of the Internet and the development of big data technology, an increasing number of organizations are opting to cooperate across domains to maximize their benefits. Most organizations use public key infrastructure to ensure security in accessing their data and applications. However, with the continuous development of identity-based encryption (IBE) technology, small- and medium-sized enterprises are increasingly using IBE to deploy internal authentication systems. To solve the problems that arise when crossing heterogeneous authentication domains and to guarantee the security of the certification process, we propose using blockchain technology to establish a reliable cross-domain authentication scheme. Using the distributed and tamper-resistant characteristics of the blockchain, we design a cross-domain authentication model based on blockchain to guarantee the security of the heterogeneous authentication process and present a cross-domain authentication protocol based on blockchain. This model does not change the internal trust structure of each authentication domain and is highly scalable. Furthermore, on the premise of ensuring security, the process of verifying the signature of the root certificate in the traditional cross-domain authentication protocol is improved to verify the hash value of the root certificate, thereby improving the authentication efficiency. The developed prototype exhibits generality and simplicity compared to previous methods.


Author(s):  
Eter Basar ◽  
Ankur Pan Saikia ◽  
L. P. Saikia

Data Technology industry has been utilizing the customary social databases for around 40 years. Be that as it may, in the latest years, there was a generous transformation in the IT business as far as business applications. Remain solitary applications have been supplanted with electronic applications, conferred servers with different proper servers and committed stockpiling with framework stockpiling. Lower expense, adaptability, the model of pay-as-you-go are the fundamental reasons, which caused the conveyed processing are transformed into reality. This is a standout amongst the hugest upsets in Information Technology, after the development of the Internet. Cloud databases, Big Table, Sherpa, and SimpleDB are getting the opportunity to be more natural to groups. They featured the hindrances of current social databases as far as convenience, adaptability, and provisioning. Cloud databases are basically utilized for data raised applications, for example, stockpiling and mining of gigantic information or business information. These applications are adaptable and multipurpose in nature. Various esteem based data organization applications, such as managing an account, online reservation, e-exchange and stock organization, and so on are delivered. Databases with the help of these sorts of uses need to incorporate four essential highlights: Atomicity, Consistency, Isolation, and Durability (ACID), in spite of the fact that utilizing these databases isn't basic for utilizing as a part of the cloud. The objective of this paper is to discover the points of interest and disservices of databases generally utilized in cloud frameworks and to survey the difficulties in creating cloud databases


Sign in / Sign up

Export Citation Format

Share Document