Authentication based on singular cellular automata

被引:0
|
作者
Jeon, Jun-Cheol [1 ]
Yoo, Kee-Young [1 ]
机构
[1] Kyungpook Natl Univ, Dept Comp Engn, Taegu 702701, South Korea
来源
关键词
One-Time Password; cellular automata; singular operation; authentication; hash function;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
One-Time Password (OTP) authentication schemes have been grown based on the time synchronization or one-way hash functions, although they can be trouble some and have a high computational complexity. In order to remedy the problems, the current paper provides a low-complexity authentication scheme which is only composed of logical bitwise operations such as XOR, AND, OR, and NOT. Our scheme highly minimizes the computational and transmission complexity and solves the time or sequence synchronization problems by applying singular CA based on the non-reversibility and uniqueness of the state configuration. Thus, our secure authentication scheme can be effectively used for other applications requiring authentication that is secure against passive attacks based on replaying captured reusable passwords.
引用
收藏
页码:605 / 610
页数:6
相关论文
共 50 条
  • [21] Theory and application of non-group cellular automata for message authentication
    Dasgupta, P
    Chattopadhyay, S
    Sengupta, I
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2001, 47 (05) : 383 - 404
  • [22] User Authentication Based on Quantum-Dot Cellular Automata Using Reversible Logic for Secure Nanocommunication
    Jadav Chandra Das
    Debashis De
    [J]. Arabian Journal for Science and Engineering, 2016, 41 : 773 - 784
  • [23] Non-group cellular automata based one time password authentication scheme in wireless networks
    Jeon, Jun-Cheol
    Kim, Kee-Won
    Yoo, Kee-Young
    [J]. SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 110 - 116
  • [24] User Authentication Based on Quantum-Dot Cellular Automata Using Reversible Logic for Secure Nanocommunication
    Das, Jadav Chandra
    De, Debashis
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2016, 41 (03) : 773 - 784
  • [25] Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform
    Wu, Xiaotian
    Sun, Wei
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (04) : 1068 - 1088
  • [26] Cellular Automata: Elementary Cellular Automata
    Bhardwaj, Rupali
    Upadhyay, Anil
    [J]. JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2017, 29 (01) : 42 - 50
  • [27] Quantum dot Cellular Automata based Fault Tolerant Fingerprint Authentication Systems using Reversible Logic Gates
    Ahmed, Suhaib
    Naz, Syed
    Sharma, Sparsh
    [J]. GAZI UNIVERSITY JOURNAL OF SCIENCE, 2022, 35 (02): : 586 - 604
  • [28] Copyright Protection and Content Authentication Based on Linear Cellular Automata Watermarking for 2D Vector Maps
    AL-ardhi, Saleh
    Thayananthan, Vijey
    Basuhail, Abdullah
    [J]. ADVANCES IN COMPUTER VISION, CVC, VOL 1, 2020, 943 : 700 - 719
  • [29] A cryptosystem based on elementary cellular automata
    Abdo, A. A.
    Lian, Shiguo
    Ismail, I. A.
    Amin, M.
    Diab, H.
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2013, 18 (01) : 136 - 147
  • [30] A Percolation Algorithm Based on Cellular Automata
    Khanjary, Mohammad
    Sabaei, Masoud
    Meybodi, Mohammad Reza
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY (EIT), 2015, : 472 - 477