Elliptic Curve Cryptography on E-passport Authentication Protocol

被引:0
|
作者
Saoudi, Safa [1 ]
Yousfi, Souheib [2 ]
Robbana, Riadh [2 ]
机构
[1] Polytech Sch Tunisia, Dept Comp Sci, La Marsa, Tunisia
[2] Natl Inst Appl Sci & Technol, Dept Comp Sci, Tunis, Tunisia
关键词
E-passport; Authentication; Elliptic Curve Cryptography; Biometric; Shared Secret; BAN Logic;
D O I
10.1109/AICCSA.2017.176
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An electronic passport is a relatively new document type which many states are considering as a new form for travelling. E-passport is significantly more secure than a traditional passport. It promises the possibility of secure, simple and quick travel formalities. It is a relatively new feature and it deploys new technologies such as biometrics and Radio Frequency identification. We delve into security features and implications of this impending universal experiment of authentication technology. E-passport is involved in the improvement of travelling security. It is expected to protect data and guarantee authentication on inspection processes. International organizations are enhancing standards of E-passport security by implementation of new protocols. However, attackers still able to break them. In this paper, a new mechanism is presented to strengthen e-passport authentication process. We propose a new protocol based on Elliptic Curve, Identity-Based Encryption and Shared Secret between entities. We formally analyse the authentication of the protocol using the BAN Logic language, which is specially dedicated to describe and verify security protocols. This proposal aims to provide a secure data storage and authentication.
引用
收藏
页码:1253 / 1260
页数:8
相关论文
共 50 条
  • [31] CTRL-PACE: Controlled Randomness for e-Passport Password Authentication
    Hanzlik, Lucjan
    Kutylowski, Miroslaw
    Kluczniak, Kamil
    FUNDAMENTA INFORMATICAE, 2019, 169 (04) : 295 - 330
  • [32] Authentication Enhancement Techniques for BAC in 2G E-Passport
    Abdal-Ghafour, Nermeen M.
    Abdel-Hamid, Ayman A.
    Nasr, Mohamed E.
    Khamis, Salah A.
    PROCEEDINGS OF THE 2016 12TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2016, : 132 - 137
  • [33] An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
    Wu, Kan
    Gong, Peng
    Wang, Jiantao
    Yan, Xiaopeng
    Li, Ping
    ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY, 2013, 16 (04): : 324 - 335
  • [34] Elliptic Curve Cryptography Based Authentication Protocol for Small Computational Capacity RFID Systems
    Godor, Gyozo
    Szendi, Peter
    Imre, Sandor
    Q2SWINET 2010: PROCEEDINGS OF THE SIXTH ACM SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2010, : 98 - 105
  • [35] A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    He, Debiao
    Chen, Jianhua
    Chen, Yitao
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1423 - 1429
  • [36] A robust authentication protocol for multi-server architecture using elliptic curve cryptography
    Zhang, Xueqin
    Wang, Baoping
    Zhang, Wenpeng
    International Journal of Network Security, 2019, 21 (02) : 191 - 198
  • [37] An Advanced Elliptic Curve Cryptography based Mutual Authentication Scheme for Session Initiation Protocol
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (04): : 393 - 400
  • [38] A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography
    Chunhua Jin
    Chunxiang Xu
    Xiaojun Zhang
    Jining Zhao
    Journal of Medical Systems, 2015, 39
  • [39] A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
    Zhang, Zezhong
    Qi, Qingqing
    Kumar, Neeraj
    Chilamkurti, Naveen
    Jeong, Hwa-Young
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (10) : 3477 - 3488
  • [40] A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
    Zezhong Zhang
    Qingqing Qi
    Neeraj Kumar
    Naveen Chilamkurti
    Hwa-Young Jeong
    Multimedia Tools and Applications, 2015, 74 : 3477 - 3488