Robust Two-factor Smart Card Authentication

被引:0
|
作者
Candan, Omer Mert [1 ]
Levi, Albert [1 ]
机构
[1] Sabanci Univ, Istanbul, Turkey
关键词
Two-factor Authentication; Remote Login; Smart Card; Offline Dictionary Attack; Elliptic Curve Cryptography;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Being very resilient devices, smart cards have been commonly used for two-factor authentication schemes. However, the possibility of side-channel attacks renders private data stored in the cards vulnerable to compromise. With this in mind, we propose an authentication protocol that incorporates a second factor, which is as a password, in addition to the smart card. The scheme is aimed to withstand most common security breaches as well as compromised smart card scenarios and offline dictionary attacks on the passwords. Details of a reference implementation are also given along with performance evaluation of the proposed protocol comparing to the literature. Performance analyses show that the proposed protocol outperforms existing solutions in the literature. Moreover, the computational cost of the proposed protocol is less than 2 seconds on our reference implementation that uses commercially available smart cards.
引用
收藏
页码:184 / 188
页数:5
相关论文
共 50 条
  • [1] A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card
    Ziauddin, Sheikh
    [J]. SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 209 - 216
  • [2] Design of a lightweight two-factor authentication scheme with smart card revocation
    Mishra, Dheerendra
    Chaturvedi, Ankita
    Mukhopadhyay, Sourav
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 23 : 44 - 53
  • [3] Efficient Two-Factor Authentication Protocol Using Password and Smart Card
    Liu, Fenghua
    [J]. JOURNAL OF COMPUTERS, 2013, 8 (12) : 3257 - 3263
  • [4] Two-factor authentication schemes based smart card and password with user anonymity
    Cao, Tianjie
    Huang, Shi
    [J]. Journal of Computational Information Systems, 2013, 9 (21): : 8831 - 8838
  • [5] A Robust Two-Factor User Authentication Scheme-Based ECC for Smart Home in IoT
    Zou, Shihong
    Cao, Qiang
    Wang, Chenyu
    Huang, Zifu
    Xu, Guoai
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 4938 - 4949
  • [6] Two-factor Authentication for Android Host Card Emulated Contactless Cards
    Munch-Ellingsen, Arne
    Karlsen, Richard
    Andersen, Anders
    Akselsen, Sigmund
    [J]. 2015 1ST CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2015, : 13 - 18
  • [7] Blockchain-Based Two-Factor Authentication for Credit Card Validation
    Mercan, Suat
    Cebe, Mumin
    Akkaya, Kemal
    Zuluaga, Julian
    [J]. DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, ESORICS 2021, 2022, 13140 : 319 - 327
  • [8] Two-factor mutual authentication based on smart cards and passwords
    Yang, Guomin
    Wong, Duncan S.
    Wang, Huaxiong
    Deng, Xiaotie
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2008, 74 (07) : 1160 - 1172
  • [9] Trustless Two-Factor Authentication using Smart Contracts in Blockchains
    Amrutiya, Varun
    Jhamb, Siddhant
    Priyadarshi, Pranjal
    Bhatia, Ashutosh
    [J]. 33RD INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2019), 2019, : 66 - 71
  • [10] Robust Mobile Two-Factor Authentication Leveraging Acoustic Fingerprinting
    Ren Y.
    Yang T.
    Xia Z.
    Liu H.
    Yu J.
    Liu B.
    Li H.
    [J]. IEEE Transactions on Mobile Computing, 2024, 23 (12) : 1 - 17