An Efficient Two-Factor Remote User Authentication and Session Key Agreement Scheme Using Rabin Cryptosystem

被引:0
|
作者
Preeti Chandrakar
Hari Om
机构
[1] IIT (ISM),Department of CSE
关键词
Authentication; tool; logic; Rabin cryptosystem; Two-factor;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we present a safe and reliable remote user authentication and session key agreement scheme using the Rabin cryptosystem. The Rabin cryptosystem relies on prime integer factorization, which provides high security. Our scheme is validated using the Burrows–Abadi–Needham logic, which proved that it facilitates mutual authentication and session key agreement securely. The informal security analysis shows that the proposed scheme is secured against various malicious attacks. We simulate our scheme using the well-known Automated Validation of Internet Security Protocols and Applications tool, which confirms that the proposed scheme can defend from the passive and active attacks and also prevents the man-in-the-middle and replay attacks. Further, the performance evaluation shows that our scheme provides robustness against various security attacks as well as efficient in the terms of smart card storage cost, estimated execution time, communication cost and computation cost.
引用
收藏
页码:661 / 673
页数:12
相关论文
共 50 条
  • [1] An Efficient Two-Factor Remote User Authentication and Session Key Agreement Scheme Using Rabin Cryptosystem
    Chandrakar, Preeti
    Om, Hari
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (02) : 661 - 673
  • [2] A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme
    Chandrakar, Preeti
    Om, Hari
    [J]. INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING, 2016, 12 (02) : 62 - 79
  • [3] Two-Factor User Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem
    Qu, Juan
    Tan, Xiao-Ling
    [J]. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2014, 2014
  • [4] A Two-factor based Remote User Authentication Scheme using ElGamal Cryptosystem
    Soni, Preeti
    Ali, Rifaqat
    Pal, Arup Kumar
    [J]. IOTSEC'17: PROCEEDINGS OF THE ACM WORKSHOP ON INTERNET OF THINGS (IOT) SECURITY: ISSUES AND INNOVATIONS, 2017,
  • [5] An Efficient Remote User Password Authentication Scheme based on Rabin's Cryptosystem
    Ranjan, Pratik
    Om, Hari
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (01) : 217 - 244
  • [6] An Efficient Remote User Password Authentication Scheme based on Rabin’s Cryptosystem
    Pratik Ranjan
    Hari Om
    [J]. Wireless Personal Communications, 2016, 90 : 217 - 244
  • [7] Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement
    Shohaimay, Fairuz
    Ismail, Eddie Shahril
    [J]. MATHEMATICS, 2023, 11 (01)
  • [8] Robust two-factor authentication and key agreement preserving user privacy
    Jiang, Qi
    Ma, Jianfeng
    Li, Guangsong
    Yang, Li
    [J]. International Journal of Network Security, 2014, 16 (03) : 229 - 240
  • [9] User-centric Two-factor Authentication Key Agreement Protocol
    Yang, Xue
    Liu, Yi-Jing
    Jiang, Qi
    Wang, Jin-Hua
    Li, Xing-Hua
    [J]. Ruan Jian Xue Bao/Journal of Software, 2024, 35 (10): : 4859 - 4875
  • [10] An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol
    Reddy, Alavalapati Goutham
    Yoon, Eun-Jun
    Das, Ashok Kumar
    Yoo, Kee-Young
    [J]. SECURITY OF INFORMATION AND NETWORKS (SIN'16), 2016, : 144 - 148