Authentication based on singular cellular automata

被引:0
|
作者
Jeon, Jun-Cheol [1 ]
Yoo, Kee-Young [1 ]
机构
[1] Kyungpook Natl Univ, Dept Comp Engn, Taegu 702701, South Korea
来源
关键词
One-Time Password; cellular automata; singular operation; authentication; hash function;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
One-Time Password (OTP) authentication schemes have been grown based on the time synchronization or one-way hash functions, although they can be trouble some and have a high computational complexity. In order to remedy the problems, the current paper provides a low-complexity authentication scheme which is only composed of logical bitwise operations such as XOR, AND, OR, and NOT. Our scheme highly minimizes the computational and transmission complexity and solves the time or sequence synchronization problems by applying singular CA based on the non-reversibility and uniqueness of the state configuration. Thus, our secure authentication scheme can be effectively used for other applications requiring authentication that is secure against passive attacks based on replaying captured reusable passwords.
引用
收藏
页码:605 / 610
页数:6
相关论文
共 50 条
  • [1] Cellular Automata based authentication (CAA)
    Mukherjee, O
    Ganguly, N
    Chaudhuri, A
    Chaudhuri, PP
    [J]. PROCEEDINGS OF THE ICCC 2002: 15TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION, VOLS 1 AND 2: REDEFINING INTERNET IN THE CONTEXT OF PERVASIVE COMPUTING, 2002, : 575 - 590
  • [2] Cellular automata based authentication (CAA)
    Mukherjee, M
    Ganguly, N
    Chaudhuri, PP
    [J]. CELLULAR AUTOMATA, PROCEEDINGS, 2002, 2493 : 259 - 269
  • [3] Message authentication protocol based on cellular automata
    del Rey, A. Martin
    [J]. APPLICATIONS OF EVOLUTIONARY COMPUTING, PROCEEDINGS, 2007, 4448 : 52 - 60
  • [4] CARMA: Cellular automata based remote mutual authentication scheme
    Tripathy, Somanath
    Nandi, Sukumar
    Chowdhury, Atanu Roy
    [J]. ICIT 2006: 9TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2006, : 190 - +
  • [5] CARA: Cellular Automata based Remote-user Authentication scheme
    Tripathy, Somanath
    Chowdhury, Atanu Roy
    Nandi, Sukumar
    [J]. 2006 1ST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2006, : 67 - +
  • [6] Hologram authentication based on a secure watermarking algorithm using cellular automata
    Hwang, Wen-Jyi
    Chan, Hao-Tang
    Cheng, Chau-Jern
    [J]. APPLIED OPTICS, 2014, 53 (27) : G64 - G73
  • [7] Restorable image authentication with cellular automata transform
    Jin, Jun
    Shu, Hong-Ping
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2009, 38 (06): : 1026 - 1030
  • [8] Cellular automata-based authentication for low-cost RFID systems
    Tripathy, S.
    Nandi, S.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2009, 3 (03) : 199 - 216
  • [9] CAPEC: A Cellular Automata Guided FSM-based IP Authentication Scheme
    Rahman, Mridha Md Mashahedur
    Rahman, M. Sazadur
    Kibria, Rasheed
    Borza, Mike
    Reddy, Bandy
    Cron, Adam
    Rahman, Fahim
    Tehranipoor, Mark
    Farahmandi, Farimah
    [J]. 2023 IEEE 41ST VLSI TEST SYMPOSIUM, VTS, 2023,
  • [10] Low-complexity authentication scheme based on cellular automata in wireless network
    Jeon, JC
    Kim, KW
    Yoo, KY
    [J]. MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2005, 3794 : 413 - 421