Design of improved password authentication and update scheme based on elliptic curve cryptography

被引:62
|
作者
Islam, S. K. Hafizul [1 ]
Biswas, G. P. [1 ]
机构
[1] Indian Sch Mines, Dept Comp Sci & Engn, Dhanbad 826004, Bihar, India
关键词
Password authentication; Elliptic curve cryptography; Cryptographic hash function; Impersonation attack; Insider attack; REMOTE USER ACCESS; SECURE; CRYPTANALYSIS;
D O I
10.1016/j.mcm.2011.07.001
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Secured password authentication and update of passwords are two essential requirements for remote login over unreliable networks. In this paper, an elliptic curve cryptography (ECC) based technique has been proposed that not only satisfies the above two requirements, but also provides additional security requirements that are not available in some schemes proposed so far. For instances, the Peyravian and Zunic's scheme does not provide the protection against the password guessing attack, server spoofing attack and data eavesdropping attack. Although some modifications to remove these attacks have been proposed by Hwang and Yeh, Lee et al., it has been found that some attacks like replay attack, server spoofing attack, data eavesdropping attack, etc. are still possible. Subsequently, Hwang and Yeh's scheme is further improved by Lin and Hwang, which has been analyzed in this paper and certain security flaws have been identified. We have attempted to remove these security flaws and proposed an ECC-based scheme that in addition to the secured password authentication and password update, it protects several related attacks efficiently. As a proof of our claim, the detailed security analysis of the proposed scheme against the attacks has been given. One advantage of the proposed scheme is that it generates an ECC-basedcommonsecret key that can be used for symmetric encryption, which requires lesser processing time than the time required in the public key encryption-based techniques. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:2703 / 2717
页数:15
相关论文
共 50 条
  • [31] Deniable authentication protocol based on elliptic curve cryptography
    Hwang, MS
    Sung, PC
    Tzeng, SF
    [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 65 - 67
  • [32] A Design of Elliptic Curve Cryptography-based Authentication using QR Code
    Thiranant, Non
    Kang, Young-Jin
    Kim, Taeyong
    Jang, WonTae
    Park, Suhyun
    Lee, HoonJae
    [J]. 2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 614 - 619
  • [33] A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography
    Chaudhry, Shehzad Ashraf
    Khan, Muhammad Tawab
    Khan, Muhammad Khurram
    Shon, Taeshik
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
  • [34] A Novel Authentication Scheme for Mobile Environments in the Context of Elliptic Curve Cryptography
    Kasra-Kermanshahi, Shabnam
    Salleh, Mazleena
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2015,
  • [35] A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography
    Shehzad Ashraf Chaudhry
    Muhammad Tawab Khan
    Muhammad Khurram Khan
    Taeshik Shon
    [J]. Journal of Medical Systems, 2016, 40
  • [36] The Study of Password Authentication System Based on Elliptic Curve Cryptosystem
    Wei Haiping
    Jia Chuanying
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 6309 - 6312
  • [37] An Improved Secure RFID Authentication Protocol Using Elliptic Curve Cryptography
    Liu, Wan-Rong
    Ji, Zhi-Yong
    Chu, Cheng-Chen
    [J]. International Journal of Network Security, 2024, 26 (01) : 106 - 115
  • [38] A Robust Mutual Authentication Scheme Based on Elliptic Curve Cryptography for Telecare Medical Information Systems
    Qiu, Shuming
    Xu, Guoai
    Ahmad, Haseeb
    Wang, Licheng
    [J]. IEEE ACCESS, 2018, 6 : 7452 - 7463
  • [39] Mixed symmetric key and elliptic curve encryption scheme used for password authentication and update under unstable network environment
    School of Information Technology and Engineering, Jinzhong University, Jinzhong
    Shanxi
    030600, China
    不详
    116620, China
    不详
    110034, China
    [J]. J. Inf. Hiding Multimedia Signal Proces., 3 (632-639):
  • [40] Mixed symmetric key and elliptic curve encryption scheme used for password authentication and update under unstable network environment
    [J]. Li, Haifeng (lihaifeng8848@mail.dlut.edu.cn), 1600, Ubiquitous International (08):